Prix bas
CHF109.60
Impression sur demande - l'exemplaire sera recherché pour vous.
As security technology (ST) becomes specialized and fragmented, it is easy to lose sight that many topics in ST have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation of results between d- ferent sub-disciplines of ST encourages this interchange for the advancement of ST as a whole. Of particular interest is the hybrid approach of combining ideas from one discipline with those of another to achieve a result that is more significant than the sum of the individual parts. Through this hybrid philosophy, a new or common pr- ciple can be discovered which has the propensity to propagate throughout this mul- faceted discipline. This volume comprises the selection of extended versions of papers that were p- sented in their shortened form at the 2008 International Conference on Security Te- nology and 2009 Advanced Science and Te- nology . We would like to acknowledge the great effort of all in the SecTech 2008 and AST 2009 International Advisory Board and members of the International Program Committee, as well as all the organizations and individuals who supported the idea of publishing these advances in security technology, including SERSC and Springer. We would like to give special thanks to Rosslin John Robles, Maricel O. Balitanas, Farkhod Alisherov Alisherovish, Feruza Sattarova Yusfovna. These graduate school students of Hannam University attended to the editing process of this volume with great passion.
Texte du rabat
This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008. The book includes the special sessions on advanced security technologies towards convergence and green IT (AST-CGIT 2008), on biometrics: security and privacy (BSP 2008), on security education (ASSSE 2008), on security engineering environment (SEE 2008), wireless networks (WN 2008).
Contenu
Security Analysis of A Novel Elliptic Curve Dynamic Access Control System.- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions.- Feature Extraction for IRIS Recognition.- Bidirectional Quantum Secure Direct Communication Based on Entanglement.- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux.- Research on Streaming Data Integration System about Security Threat Monitor.- Using Honeypots to Secure E-Government Networks.- Trust-Risk-Game Based Access Control in Cross Domain Application.- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis.- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment.- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework.- A Secured Technique for Image Data Hiding.