Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings /

This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume pres...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Park, Jong Hyuk (Επιμελητής έκδοσης), Zhan, Justin (Επιμελητής έκδοσης), Lee, Changhoon (Επιμελητής έκδοσης), Wang, Guilin (Επιμελητής έκδοσης), Kim, Tai-hoon (Επιμελητής έκδοσης), Yeo, Sang-Soo (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Σειρά:Communications in Computer and Information Science, 36
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04380nam a22006135i 4500
001 978-3-642-02633-1
003 DE-He213
005 20161122074609.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642026331  |9 978-3-642-02633-1 
024 7 |a 10.1007/978-3-642-02633-1  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Advances in Information Security and Its Application  |h [electronic resource] :  |b Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings /  |c edited by Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-hoon Kim, Sang-Soo Yeo. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a X, 127 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Communications in Computer and Information Science,  |x 1865-0929 ;  |v 36 
505 0 |a Information Assurance and Its Application -- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections -- A Security Metrics Development Method for Software Intensive Systems -- The ISDF Framework: Integrating Security Patterns and Best Practices -- Security Protocol and Its Application -- Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server -- Concurrency and Time in Role-Based Access Control -- Performance Assessment Method for a Forged Fingerprint Detection Algorithm -- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings -- A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes -- Context-Based E-Health System Access Control Mechanism -- Analysis of a Mathematical Model for Worm Virus Propagation -- Other Security Research -- A Contents Encryption Mechanism Using Reused Key in IPTV -- High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform -- Experiment Research of Automatic Deception Model Based on Autonomic Computing -- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks -- Reconsidering Data Logging in Light of Digital Forensics -- Blurriness in Live Forensics: An Introduction. 
520 |a This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application; security protocol and its application, other security research. 
650 0 |a Computer science. 
650 0 |a Computer organization. 
650 0 |a Computer communication systems. 
650 0 |a Computer system failures. 
650 0 |a Computer security. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Computer Systems Organization and Communication Networks. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Data Encryption. 
650 2 4 |a System Performance and Evaluation. 
700 1 |a Park, Jong Hyuk.  |e editor. 
700 1 |a Zhan, Justin.  |e editor. 
700 1 |a Lee, Changhoon.  |e editor. 
700 1 |a Wang, Guilin.  |e editor. 
700 1 |a Kim, Tai-hoon.  |e editor. 
700 1 |a Yeo, Sang-Soo.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642026324 
830 0 |a Communications in Computer and Information Science,  |x 1865-0929 ;  |v 36 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-02633-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)