Information security and assurance : International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings / Tai-hoon Kim [and others] (eds.)
Machine generated contents note: Information Security Awareness Campaign: An Alternate Approach / Muhammad Khurram Khan -- Equivalent Key Recovery Attack on H2-MAC Instantiated with MD5 / Wei Wang -- Recent Progress in Code-Based Cryptography / Robert Niebuhr -- GPU Implementation of the Keccak Hash Function Family / Michael Schneider -- Comparative Study of a New Associative Classification Approach for Mining Rare and Frequent Classification Rules / Ali Jaoua -- Secret Key Awareness Security Public Key Encryption Scheme / Qiuliang Xu -- Using SAT Solving to Improve Differential Fault Analysis of Trivium / Johannes Buchmann -- Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis / Alexander Meduna -- Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review / Issa Traore -- Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems / Michele Colajanni -- 2SC: An Efficient Code-Based Stream Cipher / Sidi Mohamed El Yousfi Alaoui -- Towards Algebraic Cryptanalysis of HFE Challenge 2 / Johannes Buchmann -- S-FSB: An Improved Variant of the FSB Hash Family / Sidi Mohamed El Yousfi Alaoui -- Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes / Meziani Mohammed -- Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1 / Deia Eldien M. Ahmed -- Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme / Jayaprakash Kar -- Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm / Apostolos Tsiakalos -- Towards Next Generation System Architecture for Emergency Services / Veikko Hara -- Securing Communication between SCADA Master Station and Mobile Remote Components / Gil-Cheol Park
Note continued: Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System / Tai-hoon Kim -- Application Program Interface as Back-Up Data Source for SCADA Systems / Tai-hoon Kim -- Supervisory Control and Data Acquisition System CAIN Issues / Tai-hoon Kim -- RFID Implementation and Security Issues / Rajath Chouta -- Vehicle Tracking Based on Kalman Filter in Tunnel / Yunsik Yu -- Contents Based Music Retrieval Method Using Audio Feature Analysis against Polyphonic Music / Hochong Park -- Noise Robust Echo Canceller with Post-processing Using Liner Predictor and Wiener Filter / Jangsik Park -- Implementation Fire Detection Algorithm Using Fixed Point Digital Signal Processor / Yunsik Yu -- Efficient Private Registry Management System Using DHT Based on FIPA Agent Platform / Dong-Ryeol Shin -- ̂ Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications / Jang-Mook Kang -- Improvement of Message Processing Method for SOA Based Digital Set-Top Box System / Dae-Hyun Ryu -- Data Management Method to Secure Data in Cloud Computing Environment / Wan-Sik Kim -- VLSI Architecture of Adaptive Viterbi Decoder for Wireless Communication / Jong Tae Kim -- Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment / Seon-Hee Lee -- Development of Integrated Adapter Based on Multi-sensor Networks for Tracking and Surveillance / Do-Hyeun Kim -- High Speed and Low-Complexity Mode Decision for Advanced Video Coding / Oh-Jin Kwon -- Robust Congestion Control Design for Input Time Delayed AQM System / Jeong Jin Kang -- ̂ Intelligent Clustering Method for Highly Similar Digital Photos Using Pyramid Matching with Human Perceptual Color Histogram / Hwan-Gue Cho -- Requiremets Analysis and Critical Requirement Derivation Method Using Macrostruktur / Young-Bum Park
Note continued: Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control) / You-Sik Hong -- Vessel Tracking Using Adaboost Algorithm and AIS Information / Yunsik Yu -- Relative Self-localization Base on Fish-Eye Lenses and SIFT Algorithm for Indoor Mobile Robot / Byung-Jae Choi -- User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone / Hyung-Woo Lee
Summary
This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 2011
Bibliography
Includes bibliographical references and author index