Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

Author:   Akingbehin Kiumi ,  Tai-hoon Kim ,  Akingbehin Kiumi
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2009 ed.
Volume:   29
ISBN:  

9783642102394


Pages:   161
Publication Date:   02 November 2009
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $221.76 Quantity:  
Add to Cart

Share |

Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers


Add your own review!

Overview

As security technology (ST) becomes specialized and fragmented, it is easy to lose sight that many topics in ST have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation of results between d- ferent sub-disciplines of ST encourages this interchange for the advancement of ST as a whole. Of particular interest is the hybrid approach of combining ideas from one discipline with those of another to achieve a result that is more significant than the sum of the individual parts. Through this hybrid philosophy, a new or common pr- ciple can be discovered which has the propensity to propagate throughout this mul- faceted discipline. This volume comprises the selection of extended versions of papers that were p- sented in their shortened form at the 2008 International Conference on Security Te- nology (http://www.sersc.org/SECTECH2008/) and 2009 Advanced Science and Te- nology (http://www.sersc.org/AST2009/). We would like to acknowledge the great effort of all in the SecTech 2008 and AST 2009 International Advisory Board and members of the International Program Committee, as well as all the organizations and individuals who supported the idea of publishing these advances in security technology, including SERSC (http://www.sersc.org/) and Springer. We would like to give special thanks to Rosslin John Robles, Maricel O. Balitanas, Farkhod Alisherov Alisherovish, Feruza Sattarova Yusfovna. These graduate school students of Hannam University attended to the editing process of this volume with great passion.

Full Product Details

Author:   Akingbehin Kiumi ,  Tai-hoon Kim ,  Akingbehin Kiumi
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2009 ed.
Volume:   29
Dimensions:   Width: 15.50cm , Height: 1.00cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642102394


ISBN 10:   3642102395
Pages:   161
Publication Date:   02 November 2009
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Security Analysis of A Novel Elliptic Curve Dynamic Access Control System .- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions.- Feature Extraction for IRIS Recognition.- Bidirectional Quantum Secure Direct Communication Based on Entanglement.- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux.- Research on Streaming Data Integration System about Security Threat Monitor.- Using Honeypots to Secure E-Government Networks.- Trust-Risk-Game Based Access Control in Cross Domain Application.- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis.- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment.- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework.- A Secured Technique for Image Data Hiding.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List