Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings

Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researcher...

Full description

Bibliographic Details
Other Authors: Bandyopadhyay, Samir Kumar (Editor), Adi, Wael (Editor), Kim, Tai-hoon (Editor), Xiao, Yang (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Series:Communications in Computer and Information Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition
  • Security Improvement on a Remote User Authentication Scheme Using Smart Cards
  • Dual-Byte-Marker Algorithm for Detecting JFIF Header
  • Hiding Data in JPEG Using in-DQT Technique
  • An Analysis of Syndrome Coding
  • Intrusion Correlation Using Ontologies and Multi-agent Systems
  • Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN
  • Fault Attacks against the Miller’s Algorithm in Edwards Coordinates
  • A Cryptosystem for Encryption and Decryption of Long Confidential Messages
  • Lane Design for Speed Optimization
  • Biometric Authentication Using Infrared Imaging of Hand Vein Patterns
  • IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach
  • Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks
  • Pattern Recognition Using Artificial Neural Network: A Review
  • PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks
  • Tracing Potential School Shooters in the Digital Sphere
  • Infrastructure Aided Privacy Preserving-Authentication in VANETs
  • Attacks on Bluetooth Security Architecture and Its Countermeasures
  • Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication
  • Security Risks of Cloud Computing and Its Emergence as 5th Utility Service
  • Performance Evaluation of Video Streaming in Vehicular Adhoc Network
  • Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network
  • Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks
  • MPLS Unleashed: Remedy Using IPSEC over MPLS VPN
  • A New Holistic Security Approach for Government CriticalSystems: Flooding Prevention
  • Sensor Aided Authentication
  • Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection
  • TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
  • An Improved EKG-Based Key Agreement Scheme for Body Area Networks
  • Multi-agent Reinforcement Learning Model for Effective Action Selection