Muutke küpsiste eelistusi

E-raamat: Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings

Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC; published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and- and e-Service, Science and Technology (UNESST).
Applications of Reversible Data Hiding Techniques with the Quick Response Codes
1(8)
Hsiang-Cheh Huang
Feng-Cheng Chang
Wai-Chi Fang
A New Approach in T-FA Authentication with OTP Using Mobile Phone
9(9)
Abdulaziz S. Almazyad
Yasir Ahmad
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows
18(8)
Seyed Hossein Ahmadinejad
Saeed Jalili
A Study on Secure Contents Using in Urban Computing
26(9)
Hoon Ko
Jongmyung Choi
Carlos Ramos
Shadow Generation Protocol in Linguistic Threshold Schemes
35(8)
Marek R. Ogiela
Urszula Ogiela
Analysis of Handwritten Signature Image
43(8)
Debnath Bhattacharyya
Poulami Das
Samir Kumar Bandyopadhyay
Tai-Hoon Kim
The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device
51(6)
Bo-Heung Chung
Min-Ho Han
Ki-Young Kim
Hardware Based Data Inspection for USB Data Leakage Prevention
57(7)
Dongho Kang
Boheung Jung
Ki-Young Kim
Grayscale Image Classification Using Supervised Chromosome Clustering
64(8)
Debnath Bhattacharyya
Poulami Das
Samir Kumar Bandyopadhyay
Tai-Hoon Kim
Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models
72(14)
Linda Ariani Gunawan
Peter Herrmann
Frank Alexander Kraemer
Impact of Malicious Node on Broadcast Schemes
86(7)
Aneel Rahim
Fahad Bin Muyaha
Hierarchical Identity-Based Identification Schemes
93(7)
Ji-Jian Chin
Swee-Huag Heng
Bok-Min Goi
The Trend of the Security Research for the Insider Cyber Threat
100(8)
Jaesung Hong
Jongwung Kim
Jeonghun Cho
MIMO Wiretap Channel: A Scalar Approach
108(8)
Mohammad Rakibul Islam
Jinsang Kim
Security Testing for Operating System and Its System Calls
116(8)
Gaoshou Zhai
Hanhui Niu
Na Yang
Minli Tian
Chengyu Liu
Hengsheng Yang
Efficient Group Signature with Forward Secure Revocation
124(8)
Haimin Jin
Duncan S. Wong
Yinlong Xu
Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion
132(8)
Jieren Cheng
Jianping Yin
Yun Liu
Zhiping Cai
Chengkun Wu
Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code
140(8)
Tie-Ming Liu
Lie-Hui Jiang
Hong-Qi He
Ji-Zhong Li
Xian Yu
Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code
148(9)
Yonglong Wei
Xiaojuan Zheng
Jinglei Ren
Xudong Zheng
Chen Sun
Zhenhao Li
Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature
157(8)
Dakshina Ranjan Kisku
Phalguni Gupta
Jamuna Kanta Sing
A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network
165(11)
Seokung Yoon
Hyuncheol Jung
Kyung-Seok Lee
DDoS Attack Detection Using Three-State Partition Based on Flow Interaction
176(9)
Jieren Cheng
Boyun Zhang
Jianping Yin
Yun Liu
Zhiping Cai
A Development of Finite State Machine Create Tool for Cryptography Module Validation
185(8)
Jae-Goo Jeong
Seung-Yong Hur
Gang-Soo Lee
A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments
193(8)
Yuan Tian
Biao Song
Eui-Nam Huh
Fusion of Multiple Matchers Using SVM for Offline Signature Identification
201(8)
Dakshina Ranjan Kisku
Phalguni Gupta
Jamuna Kanta Sing
A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card
209(8)
Sheikh Ziauddin
Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors
217(8)
Peter Pecho
Jan Nagy
Petr Hanacek
Martin Drahansky
Accelerometer Based Digital Video Stabilization for Security Surveillance Systems
225(9)
Martin Drahansky
Filip Orsag
Petr Hanacek
Escrowed Deniable Identification Schemes
234(8)
Pairat Thorncharoensri
Qiong Huang
Willy Susilo
Man Ho Au
Yi Mu
Duncan Wong
Insights into Malware Detection and Prevention on Mobile Phones
242(8)
Qiang Yan
Yingjiu Li
Tieyan Li
Robert Deng
Automation of Post-exploitation: Focused on MS-Windows Targets
250(8)
Mohammad Tabatabai Irani
Edgar R. Weippl
Speaker Dependent Frequency Cepstrum Coefficients
258(7)
Filip Orsag
Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection
265(8)
David A. Carvalho
Manuela Pereira
Mario M. Freire
A Simple Encryption Scheme for Binary Elliptic Curves
273(8)
Brian King
Analysis of Text Complexity in a Crypto System - A Case Study on Telugu
281(8)
M.S.V.S. Bhadri Raju
B. Vishnu Vardhan
G.A. Naidu
L. Pratap Reddy
A. Vinaya Babu
Symmetric-Key Encryption for Wireless Internet SCADA
289(9)
Rosslin John Robles
Min-Kyu Choi
An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU
298(9)
Chengkun Wu
Jianping Yin
Zhiping Cai
En Zhu
Jieren Cheng
Author Index 307