Cargando…

Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings /

Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researcher...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Bandyopadhyay, Samir Kumar (Editor ), Adi, Wael (Editor ), Kim, Tai-hoon (Editor ), Xiao, Yang (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Communications in Computer and Information Science, 76
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition
  • Security Improvement on a Remote User Authentication Scheme Using Smart Cards
  • Dual-Byte-Marker Algorithm for Detecting JFIF Header
  • Hiding Data in JPEG Using in-DQT Technique
  • An Analysis of Syndrome Coding
  • Intrusion Correlation Using Ontologies and Multi-agent Systems
  • Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN
  • Fault Attacks against the Miller's Algorithm in Edwards Coordinates
  • A Cryptosystem for Encryption and Decryption of Long Confidential Messages
  • Lane Design for Speed Optimization
  • Biometric Authentication Using Infrared Imaging of Hand Vein Patterns
  • IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach
  • Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks
  • Pattern Recognition Using Artificial Neural Network: A Review
  • PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks
  • Tracing Potential School Shooters in the Digital Sphere
  • Infrastructure Aided Privacy Preserving-Authentication in VANETs
  • Attacks on Bluetooth Security Architecture and Its Countermeasures
  • Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication
  • Security Risks of Cloud Computing and Its Emergence as 5th Utility Service
  • Performance Evaluation of Video Streaming in Vehicular Adhoc Network
  • Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network
  • Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks
  • MPLS Unleashed: Remedy Using IPSEC over MPLS VPN
  • A New Holistic Security Approach for Government Critical Systems: Flooding Prevention
  • Sensor Aided Authentication
  • Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection
  • TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
  • An Improved EKG-Based Key Agreement Scheme for Body Area Networks
  • Multi-agent Reinforcement Learning Model for Effective Action Selection.