Cargando…

Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings /

Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) - two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Fang, Wai-chi (Editor ), Khurram Khan, Muhammad (Editor ), Arnett, Kirk P. (Editor ), Kang, Heau-jo (Editor ), Ślęzak, Dominik (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Communications in Computer and Information Science, 122
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Impact of Finger Type in Fingerprint Authentication
  • Using Arabic CAPTCHA for Cyber Security
  • Information Assurance in Saudi Organizations - An Empirical Study
  • Emerging Biometric Modalities: Challenges and Opportunities
  • On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP
  • Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan
  • Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON
  • Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device
  • Secure OSGi Platform against Service Injection
  • A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse
  • Probabilistic Route Selection Algorithm for IP Traceback
  • An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection
  • Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model
  • Histogram-Based Reversible Data Hiding with Quadtree Concepts
  • MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology
  • Performance Analysis of Cyber Security Awareness Delivery Methods
  • Proxy Re-encryption with Keyword Search: New Definitions and Algorithms
  • One-Time Password System with Infinite Nested Hash Chains
  • Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence
  • Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor
  • Fusion of Moving and Static Facial Features for Robust Face Recognition
  • Human Authentication Based on ECG Waves Using Radon Transform
  • Wireless Network Security Vulnerabilities and Concerns
  • Figment Authentication Scheme in Wireless Sensor Network
  • Issues of Security and Network Load in Presence - A Survey
  • Discovering the Botnet Detection Techniques
  • Contactless Biometrics in Wireless Sensor Network: A Survey
  • A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems
  • Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010
  • Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model
  • Internet SCADA Utilizing API's as Data Source
  • Insecure Information System's Solution Using Isolation Method
  • Communication Security for Control Systems in Smart Grid
  • NMACA Approach Used to Build a Secure Message Authentication Code.