Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume pres...

Full description

Bibliographic Details
Other Authors: Park, James (Jong Hyuk) (Editor), Zhan, Justin (Editor), Lee, Changhoon (Editor), Wang, Guilin (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2009, 2009
Edition:1st ed. 2009
Series:Communications in Computer and Information Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03744nmm a2200457 u 4500
001 EB000382583
003 EBX01000000000000000235635
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783642026331 
100 1 |a Park, James (Jong Hyuk)  |e [editor] 
245 0 0 |a Advances in Information Security and Its Application  |h Elektronische Ressource  |b Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings  |c edited by James (Jong Hyuk) Park, Justin Zhan, Changhoon Lee, Guilin Wang, Sang-Soo Yeo 
250 |a 1st ed. 2009 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2009, 2009 
300 |a X, 127 p  |b online resource 
505 0 |a Information Assurance and Its Application -- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections -- A Security Metrics Development Method for Software Intensive Systems -- The ISDF Framework: Integrating Security Patterns and Best Practices -- Security Protocol and Its Application -- Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server -- Concurrency and Time in Role-Based Access Control -- Performance Assessment Method for a Forged Fingerprint Detection Algorithm -- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings -- A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes -- Context-Based E-Health System Access Control Mechanism -- Analysis of a Mathematical Model for Worm Virus Propagation -- Other Security Research -- A Contents Encryption Mechanism Using Reused Key in IPTV -- High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform -- Experiment Research of Automatic Deception Model Based on Autonomic Computing -- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks -- Reconsidering Data Logging in Light of Digital Forensics -- Blurriness in Live Forensics: An Introduction 
653 |a Computer Communication Networks 
653 |a Electronic digital computers / Evaluation 
653 |a System Performance and Evaluation 
653 |a Cryptography 
653 |a Data Structures and Information Theory 
653 |a Computer networks  
653 |a Computer Engineering and Networks 
653 |a Information theory 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Data structures (Computer science) 
653 |a Cryptology 
653 |a Computer engineering 
653 |a Data and Information Security 
700 1 |a Zhan, Justin  |e [editor] 
700 1 |a Lee, Changhoon  |e [editor] 
700 1 |a Wang, Guilin  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Communications in Computer and Information Science 
028 5 0 |a 10.1007/978-3-642-02633-1 
856 4 0 |u https://doi.org/10.1007/978-3-642-02633-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6 
520 |a This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application; security protocol and its application, other security research