Security Technology
Springer Berlin (Verlag)
978-3-642-10846-4 (ISBN)
Applications of Reversible Data Hiding Techniques with the Quick Response Codes.- A New Approach in T-FA Authentication with OTP Using Mobile Phone.- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.- A Study on Secure Contents Using in Urban Computing.- Shadow Generation Protocol in Linguistic Threshold Schemes.- Analysis of Handwritten Signature Image.- The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device.- Hardware Based Data Inspection for USB Data Leakage Prevention.- Grayscale Image Classification Using Supervised Chromosome Clustering.- Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models.- Impact of Malicious Node on Broadcast Schemes.- Hierarchical Identity-Based Identification Schemes.- The Trend of the Security Research for the Insider Cyber Threat.- MIMO Wiretap Channel: A Scalar Approach.- Security Testing for Operating System and Its System Calls.- Efficient Group Signature with Forward Secure Revocation.- Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.- Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.- Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code.- Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature.- A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network.- DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.- A Development of Finite State Machine Create Tool for Cryptography Module Validation.- A Privacy-Aware System Using Threat-Based Evaluation and Feedback Methodin Untrusted Ubiquitous Environments.- Fusion of Multiple Matchers Using SVM for Offline Signature Identification.- A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card.- Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.- Accelerometer Based Digital Video Stabilization for Security Surveillance Systems.- Escrowed Deniable Identification Schemes.- Insights into Malware Detection and Prevention on Mobile Phones.- Automation of Post-exploitation.- Speaker Dependent Frequency Cepstrum Coefficients.- Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.- A Simple Encryption Scheme for Binary Elliptic Curves.- Analysis of Text Complexity in a Crypto System - A Case Study on Telugu.- Symmetric-Key Encryption for Wireless Internet SCADA.- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.
Erscheint lt. Verlag | 24.11.2009 |
---|---|
Reihe/Serie | Communications in Computer and Information Science |
Zusatzinfo | XIII, 308 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 498 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • behavior models • BitTorrent • broadcast • Code • Communication • Cryptanalysis • cryptography • data hiding • DOS • Elliptic Curves • handwriting • Hardcover, Softcover / Informatik, EDV/Informatik • Intrusion Detection • malvare detection • metrics • MIMO • Partition • privacy • Signatures • SIP • urban computing • VoIP • wireless sensors |
ISBN-10 | 3-642-10846-6 / 3642108466 |
ISBN-13 | 978-3-642-10846-4 / 9783642108464 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich