Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings /

Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researcher...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Bandyopadhyay, Samir Kumar (Επιμελητής έκδοσης), Adi, Wael (Επιμελητής έκδοσης), Kim, Tai-hoon (Επιμελητής έκδοσης), Xiao, Yang (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Communications in Computer and Information Science, 76
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition
  • Security Improvement on a Remote User Authentication Scheme Using Smart Cards
  • Dual-Byte-Marker Algorithm for Detecting JFIF Header
  • Hiding Data in JPEG Using in-DQT Technique
  • An Analysis of Syndrome Coding
  • Intrusion Correlation Using Ontologies and Multi-agent Systems
  • Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN
  • Fault Attacks against the Miller’s Algorithm in Edwards Coordinates
  • A Cryptosystem for Encryption and Decryption of Long Confidential Messages
  • Lane Design for Speed Optimization
  • Biometric Authentication Using Infrared Imaging of Hand Vein Patterns
  • IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach
  • Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks
  • Pattern Recognition Using Artificial Neural Network: A Review
  • PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks
  • Tracing Potential School Shooters in the Digital Sphere
  • Infrastructure Aided Privacy Preserving-Authentication in VANETs
  • Attacks on Bluetooth Security Architecture and Its Countermeasures
  • Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication
  • Security Risks of Cloud Computing and Its Emergence as 5th Utility Service
  • Performance Evaluation of Video Streaming in Vehicular Adhoc Network
  • Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network
  • Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks
  • MPLS Unleashed: Remedy Using IPSEC over MPLS VPN
  • A New Holistic Security Approach for Government Critical Systems: Flooding Prevention
  • Sensor Aided Authentication
  • Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection
  • TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
  • An Improved EKG-Based Key Agreement Scheme for Body Area Networks
  • Multi-agent Reinforcement Learning Model for Effective Action Selection.