Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researcher...
Other Authors: | , , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2010, 2010
|
Edition: | 1st ed. 2010 |
Series: | Communications in Computer and Information Science
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition
- Security Improvement on a Remote User Authentication Scheme Using Smart Cards
- Dual-Byte-Marker Algorithm for Detecting JFIF Header
- Hiding Data in JPEG Using in-DQT Technique
- An Analysis of Syndrome Coding
- Intrusion Correlation Using Ontologies and Multi-agent Systems
- Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN
- Fault Attacks against the Miller’s Algorithm in Edwards Coordinates
- A Cryptosystem for Encryption and Decryption of Long Confidential Messages
- Lane Design for Speed Optimization
- Biometric Authentication Using Infrared Imaging of Hand Vein Patterns
- IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach
- Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks
- Pattern Recognition Using Artificial Neural Network: A Review
- PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks
- Tracing Potential School Shooters in the Digital Sphere
- Infrastructure Aided Privacy Preserving-Authentication in VANETs
- Attacks on Bluetooth Security Architecture and Its Countermeasures
- Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication
- Security Risks of Cloud Computing and Its Emergence as 5th Utility Service
- Performance Evaluation of Video Streaming in Vehicular Adhoc Network
- Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network
- Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks
- MPLS Unleashed: Remedy Using IPSEC over MPLS VPN
- A New Holistic Security Approach for Government CriticalSystems: Flooding Prevention
- Sensor Aided Authentication
- Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection
- TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
- An Improved EKG-Based Key Agreement Scheme for Body Area Networks
- Multi-agent Reinforcement Learning Model for Effective Action Selection