Amazon cover image
Image from Amazon.com

Advances in information security and its application : third International conference, ISA 2009, Seoul, Korea, June 2009, proceedings / Jong Hyuk Park [and others] (editors).

Contributor(s): Material type: TextTextSeries: Communications in computer and information science ; 36 | Communications in computer and information sciencePublisher: Berlin : Springer, 2009Description: x, 126 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 364202632X
  • 9783642026324
Other title:
  • ISA 2009
Subject(s): DDC classification:
  • 005.8 PA.A 2009 23
LOC classification:
  • TK5105.59 .A38 2009
Contents:
Information Assurance and Its Application -- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections -- A Security Metrics Development Method for Software Intensive Systems -- The ISDF Framework: Integrating Security Patterns and Best Practices -- Security Protocol and Its Application -- Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server -- Concurrency and Time in Role-Based Access Control -- Performance Assessment Method for a Forged Fingerprint Detection Algorithm -- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings -- A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes -- Context-Based E-Health System Access Control Mechanism -- Analysis of a Mathematical Model for Worm Virus Propagation -- Other Security Research -- A Contents Encryption Mechanism Using Reused Key in IPTV -- High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform -- Experiment Research of Automatic Deception Model Based on Autonomic Computing -- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks -- Reconsidering Data Logging in Light of Digital Forensics -- Blurriness in Live Forensics: An Introduction.
Summary: This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application; security protocol and its application, other security research.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Gift collections 005.8 PA.A 2009 G.C (Browse shelf(Opens below)) Available 191704

Includes bibliographical references and index.

Information Assurance and Its Application -- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections -- A Security Metrics Development Method for Software Intensive Systems -- The ISDF Framework: Integrating Security Patterns and Best Practices -- Security Protocol and Its Application -- Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server -- Concurrency and Time in Role-Based Access Control -- Performance Assessment Method for a Forged Fingerprint Detection Algorithm -- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings -- A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes -- Context-Based E-Health System Access Control Mechanism -- Analysis of a Mathematical Model for Worm Virus Propagation -- Other Security Research -- A Contents Encryption Mechanism Using Reused Key in IPTV -- High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform -- Experiment Research of Automatic Deception Model Based on Autonomic Computing -- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks -- Reconsidering Data Logging in Light of Digital Forensics -- Blurriness in Live Forensics: An Introduction.

This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application; security protocol and its application, other security research.

There are no comments on this title.

to post a comment.