default search action
1st FGIT-SecTech 2009: Jeju Island, Korea
- Dominik Slezak, Tai-Hoon Kim, Wai-Chi Fang, Kirk P. Arnett:
Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 58, Springer 2009, ISBN 978-3-642-10846-4 - Hsiang-Cheh Huang, Feng-Cheng Chang, Wai-Chi Fang:
Applications of Reversible Data Hiding Techniques with the Quick Response Codes. 1-8 - Abdulaziz S. Almazyad, Yasir Ahmad:
A New Approach in T-FA Authentication with OTP Using Mobile Phone. 9-17 - Seyed Hossein Ahmadinejad, Saeed Jalili:
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows. 18-25 - Hoon Ko, Jongmyung Choi, Carlos Ramos:
A Study on Secure Contents Using in Urban Computing. 26-34 - Marek R. Ogiela, Urszula Ogiela:
Shadow Generation Protocol in Linguistic Threshold Schemes. 35-42 - Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Analysis of Handwritten Signature Image. 43-50 - Bo-heung Chung, Min-ho Han, Ki-young Kim:
The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device. 51-56 - DongHo Kang, BoHeung Jung, KiYoung Kim:
Hardware Based Data Inspection for USB Data Leakage Prevention. 57-63 - Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Grayscale Image Classification Using Supervised Chromosome Clustering. 64-71 - Linda Ariani Gunawan, Peter Herrmann, Frank Alexander Kraemer:
Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models. 72-85 - Aneel Rahim, Fahad bin Muyaha:
Impact of Malicious Node on Broadcast Schemes. 86-92 - Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
Hierarchical Identity-Based Identification Schemes. 93-99 - Jaeseung Hong, Jongwung Kim, Jeonghun Cho:
The Trend of the Security Research for the Insider Cyber Threat. 100-107 - Mohammad Rakibul Islam, Jinsang Kim:
MIMO Wiretap Channel: A Scalar Approach. 108-115 - Gaoshou Zhai, Hanhui Niu, Na Yang, Minli Tian, Chengyu Liu, Hengsheng Yang:
Security Testing for Operating System and Its System Calls. 116-123 - Haimin Jin, Duncan S. Wong, Yinlong Xu:
Efficient Group Signature with Forward Secure Revocation. 124-131 - Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Chengkun Wu:
Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion. 132-139 - Tie-Ming Liu, Liehui Jiang, Hongqi He, Ji-zhong Li, Xian Yu:
Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code. 140-147 - Yonglong Wei, Xiaojuan Zheng, Jinglei Ren, Xudong Zheng, Chen Sun, Zhenhao Li:
Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code. 148-156 - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:
Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature. 157-164 - Seokung Yoon, Hyuncheol Jung, Kyung-Seok Lee:
A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network. 165-175 - Jieren Cheng, Boyun Zhang, Jianping Yin, Yun Liu, Zhiping Cai:
DDoS Attack Detection Using Three-State Partition Based on Flow Interaction. 176-184 - Jae-goo Jeong, Seung-yong Hur, Gang-Soo Lee:
A Development of Finite State Machine Create Tool for Cryptography Module Validation. 185-192 - Yuan Tian, Biao Song, Eui-nam Huh:
A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments. 193-200 - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:
Fusion of Multiple Matchers Using SVM for Offline Signature Identification. 201-208 - Sheikh Ziauddin:
A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card. 209-216 - Peter Pecho, Jan Nagy, Petr Hanácek, Martin Drahanský:
Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors. 217-224 - Martin Drahanský, Filip Orság, Petr Hanácek:
Accelerometer Based Digital Video Stabilization for Security Surveillance Systems. 225-233 - Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan S. Wong:
Escrowed Deniable Identification Schemes. 234-241 - Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng:
Insights into Malware Detection and Prevention on Mobile Phones. 242-249 - Mohammad Tabatabai Irani, Edgar R. Weippl:
Automation of Post-exploitation - (Focused on MS-Windows Targets). 250-257 - Filip Orság:
Speaker Dependent Frequency Cepstrum Coefficients. 258-264 - David A. Carvalho, Manuela Pereira, Mário M. Freire:
Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection. 265-272 - Brian King:
A Simple Encryption Scheme for Binary Elliptic Curves. 273-280 - M. S. V. S. Bhadri Raju, B. Vishnu Vardhan, G. A. Naidu, L. Pratap Reddy, A. Vinaya Babu:
Analysis of Text Complexity in a Crypto System - A Case Study on Telugu. 281-288 - Rosslin John Robles, Min-Kyu Choi:
Symmetric-Key Encryption for Wireless Internet SCADA. 289-297 - Chengkun Wu, Jianping Yin, Zhiping Cai, En Zhu, Jieren Cheng:
An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU. 298-305
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.