Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings /
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) – two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTec...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Σειρά: | Communications in Computer and Information Science,
122 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Impact of Finger Type in Fingerprint Authentication
- Using Arabic CAPTCHA for Cyber Security
- Information Assurance in Saudi Organizations – An Empirical Study
- Emerging Biometric Modalities: Challenges and Opportunities
- On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP
- Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan
- Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON
- Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device
- Secure OSGi Platform against Service Injection
- A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse
- Probabilistic Route Selection Algorithm for IP Traceback
- An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection
- Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model
- Histogram-Based Reversible Data Hiding with Quadtree Concepts
- MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology
- Performance Analysis of Cyber Security Awareness Delivery Methods
- Proxy Re-encryption with Keyword Search: New Definitions and Algorithms
- One-Time Password System with Infinite Nested Hash Chains
- Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence
- Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor
- Fusion of Moving and Static Facial Features for Robust Face Recognition
- Human Authentication Based on ECG Waves Using Radon Transform
- Wireless Network Security Vulnerabilities and Concerns
- Figment Authentication Scheme in Wireless Sensor Network
- Issues of Security and Network Load in Presence – A Survey
- Discovering the Botnet Detection Techniques
- Contactless Biometrics in Wireless Sensor Network: A Survey
- A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems
- Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010
- Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model
- Internet SCADA Utilizing API’s as Data Source
- Insecure Information System’s Solution Using Isolation Method
- Communication Security for Control Systems in Smart Grid
- NMACA Approach Used to Build a Secure Message Authentication Code.