Advances in Security Technology

International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

Akingbehin Kiumi (Herausgeber)

Buch | Softcover
XII, 161 Seiten
2009 | 2009
Springer Berlin (Verlag)
978-3-642-10239-4 (ISBN)
53,49 inkl. MwSt
As security technology (ST) becomes specialized and fragmented, it is easy to lose sight that many topics in ST have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation of results between d- ferent sub-disciplines of ST encourages this interchange for the advancement of ST as a whole. Of particular interest is the hybrid approach of combining ideas from one discipline with those of another to achieve a result that is more significant than the sum of the individual parts. Through this hybrid philosophy, a new or common pr- ciple can be discovered which has the propensity to propagate throughout this mul- faceted discipline. This volume comprises the selection of extended versions of papers that were p- sented in their shortened form at the 2008 International Conference on Security Te- nology and 2009 Advanced Science and Te- nology . We would like to acknowledge the great effort of all in the SecTech 2008 and AST 2009 International Advisory Board and members of the International Program Committee, as well as all the organizations and individuals who supported the idea of publishing these advances in security technology, including SERSC and Springer. We would like to give special thanks to Rosslin John Robles, Maricel O. Balitanas, Farkhod Alisherov Alisherovish, Feruza Sattarova Yusfovna. These graduate school students of Hannam University attended to the editing process of this volume with great passion.

Security Analysis of "A Novel Elliptic Curve Dynamic Access Control System".- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions.- Feature Extraction for IRIS Recognition.- Bidirectional Quantum Secure Direct Communication Based on Entanglement.- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux.- Research on Streaming Data Integration System about Security Threat Monitor.- Using Honeypots to Secure E-Government Networks.- Trust-Risk-Game Based Access Control in Cross Domain Application.- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis.- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment.- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework.- A Secured Technique for Image Data Hiding.

Erscheint lt. Verlag 2.11.2009
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo XII, 161 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 276 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • biometrics • Cognition • Communication • Cryptanalysis • data hiding • e-government • Hardcover, Softcover / Informatik, EDV/Informatik • iris recognition • Probabilistic Reasoning • Quantum Cryptography • security threat • steganopraphy
ISBN-10 3-642-10239-5 / 3642102395
ISBN-13 978-3-642-10239-4 / 9783642102394
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich