Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings /
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researcher...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Σειρά: | Communications in Computer and Information Science,
76 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition
- Security Improvement on a Remote User Authentication Scheme Using Smart Cards
- Dual-Byte-Marker Algorithm for Detecting JFIF Header
- Hiding Data in JPEG Using in-DQT Technique
- An Analysis of Syndrome Coding
- Intrusion Correlation Using Ontologies and Multi-agent Systems
- Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN
- Fault Attacks against the Miller’s Algorithm in Edwards Coordinates
- A Cryptosystem for Encryption and Decryption of Long Confidential Messages
- Lane Design for Speed Optimization
- Biometric Authentication Using Infrared Imaging of Hand Vein Patterns
- IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach
- Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks
- Pattern Recognition Using Artificial Neural Network: A Review
- PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks
- Tracing Potential School Shooters in the Digital Sphere
- Infrastructure Aided Privacy Preserving-Authentication in VANETs
- Attacks on Bluetooth Security Architecture and Its Countermeasures
- Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication
- Security Risks of Cloud Computing and Its Emergence as 5th Utility Service
- Performance Evaluation of Video Streaming in Vehicular Adhoc Network
- Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network
- Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks
- MPLS Unleashed: Remedy Using IPSEC over MPLS VPN
- A New Holistic Security Approach for Government Critical Systems: Flooding Prevention
- Sensor Aided Authentication
- Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection
- TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
- An Improved EKG-Based Key Agreement Scheme for Body Area Networks
- Multi-agent Reinforcement Learning Model for Effective Action Selection.