Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings /

Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) – two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTec...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Kim, Tai-hoon. (Editor), Fang, Wai-chi. (Editor), Khan, Muhammad Khurram. (Editor), Arnett, Kirk P. (Editor), Kang, Heau-jo. (Editor), Ślęzak, Dominik. (Editor)
Format: SpringerLink eBooks
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Series:Communications in Computer and Information Science, 122
Subjects:
Online Access:http://dx.doi.org/10.1007/978-3-642-17610-4
Table of Contents:
  • Impact of Finger Type in Fingerprint Authentication
  • Using Arabic CAPTCHA for Cyber Security
  • Information Assurance in Saudi Organizations – An Empirical Study
  • Emerging Biometric Modalities: Challenges and Opportunities
  • On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP
  • Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan
  • Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON
  • Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device
  • Secure OSGi Platform against Service Injection
  • A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse
  • Probabilistic Route Selection Algorithm for IP Traceback
  • An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection
  • Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model
  • Histogram-Based Reversible Data Hiding with Quadtree Concepts
  • MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology
  • Performance Analysis of Cyber Security Awareness Delivery Methods
  • Proxy Re-encryption with Keyword Search: New Definitions and Algorithms
  • One-Time Password System with Infinite Nested Hash Chains
  • Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence
  • Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor
  • Fusion of Moving and Static Facial Features for Robust Face Recognition
  • Human Authentication Based on ECG Waves Using Radon Transform
  • Wireless Network Security Vulnerabilities and Concerns
  • Figment Authentication Scheme in Wireless Sensor Network
  • Issues of Security and Network Load in Presence – A Survey
  • Discovering the Botnet Detection Techniques
  • Contactless Biometrics in Wireless Sensor Network: A Survey
  • A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems
  • Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010
  • Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model
  • Internet SCADA Utilizing API’s as Data Source
  • Insecure Information System’s Solution Using Isolation Method
  • Communication Security for Control Systems in Smart Grid
  • NMACA Approach Used to Build a Secure Message Authentication Code.