Limit search to available items
Book Cover
E-book
Author SecTech 2008 (2008 : Sanya Shi, China)

Title Advances in security technology : international conference, SecTech 2008, and its special sessions, Sanya, Hainan Island, China, December 13-15, 2008 : revised selected papers / Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi (eds.)
Published Berlin ; New York : Springer, ©2009

Copies

Description 1 online resource (xii, 159 pages) : illustrations
Series Communications in computer and information science, 1865-0929 ; 29
Communications in computer and information science ; 29.
Contents Security Analysis of "A Novel Elliptic Curve Dynamic Access Control System" -- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions -- Feature Extraction for IRIS Recognition -- Bidirectional Quantum Secure Direct Communication Based on Entanglement -- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux -- Research on Streaming Data Integration System about Security Threat Monitor -- Using Honeypots to Secure E-Government Networks -- Trust-Risk-Game Based Access Control in Cross Domain Application -- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis -- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment -- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework -- A Secured Technique for Image Data Hiding
Summary As security technology (ST) becomes specialized and fragmented, it is easy to lose sight that many topics in ST have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation of results between d- ferent sub-disciplines of ST encourages this interchange for the advancement of ST as a whole. Of particular interest is the hybrid approach of combining ideas from one discipline with those of another to achieve a result that is more significant than the sum of the individual parts. Through this hybrid philosophy, a new or common pr- ciple can be discovered which has the propensity to propagate throughout this mul- faceted discipline. This volume comprises the selection of extended versions of papers that were p- sented in their shortened form at the 2008 International Conference on Security Te- nology (http://www.sersc.org/SECTECH2008/) and 2009 Advanced Science and Te- nology (http://www.sersc.org/AST2009/). We would like to acknowledge the great effort of all in the SecTech 2008 and AST 2009 International Advisory Board and members of the International Program Committee, as well as all the organizations and individuals who supported the idea of publishing these advances in security technology, including SERSC (http://www.sersc.org/) and Springer. We would like to give special thanks to Rosslin John Robles, Maricel O. Balitanas, Farkhod Alisherov Alisherovish, Feruza Sattarova Yusfovna. These graduate school students of Hannam University attended to the editing process of this volume with great passion
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer security -- Congresses
Computer networks -- Access control -- Congresses.
Computer networks -- Security measures -- Congresses
Internet -- Security measures -- Congresses
Informatique.
Computer networks -- Access control
Computer networks -- Security measures
Computer security
Internet -- Security measures
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Kim, Haeng-Kon.
Kim, Tai-hoon.
Kiumi, Akingbehin.
ISBN 9783642102400
3642102409
Other Titles SecTech 2008