Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings /
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) - two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTec...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Communications in Computer and Information Science,
122 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Impact of Finger Type in Fingerprint Authentication
- Using Arabic CAPTCHA for Cyber Security
- Information Assurance in Saudi Organizations - An Empirical Study
- Emerging Biometric Modalities: Challenges and Opportunities
- On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP
- Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan
- Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON
- Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device
- Secure OSGi Platform against Service Injection
- A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse
- Probabilistic Route Selection Algorithm for IP Traceback
- An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection
- Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model
- Histogram-Based Reversible Data Hiding with Quadtree Concepts
- MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology
- Performance Analysis of Cyber Security Awareness Delivery Methods
- Proxy Re-encryption with Keyword Search: New Definitions and Algorithms
- One-Time Password System with Infinite Nested Hash Chains
- Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence
- Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor
- Fusion of Moving and Static Facial Features for Robust Face Recognition
- Human Authentication Based on ECG Waves Using Radon Transform
- Wireless Network Security Vulnerabilities and Concerns
- Figment Authentication Scheme in Wireless Sensor Network
- Issues of Security and Network Load in Presence - A Survey
- Discovering the Botnet Detection Techniques
- Contactless Biometrics in Wireless Sensor Network: A Survey
- A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems
- Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010
- Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model
- Internet SCADA Utilizing API's as Data Source
- Insecure Information System's Solution Using Isolation Method
- Communication Security for Control Systems in Smart Grid
- NMACA Approach Used to Build a Secure Message Authentication Code.