Amazon cover image
Image from Amazon.com

Advances in Security Technology [electronic resource] : International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers / edited by Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi.

By: Contributor(s): Material type: TextTextSeries: Communications in Computer and Information Science ; 29Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009Description: XII, 161 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642102400
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Security Analysis of “A Novel Elliptic Curve Dynamic Access Control System” -- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions -- Feature Extraction for IRIS Recognition -- Bidirectional Quantum Secure Direct Communication Based on Entanglement -- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux -- Research on Streaming Data Integration System about Security Threat Monitor -- Using Honeypots to Secure E-Government Networks -- Trust-Risk-Game Based Access Control in Cross Domain Application -- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis -- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment -- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework -- A Secured Technique for Image Data Hiding.
In: Springer eBooks
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
E-Book E-Book Central Library Available E-46403

Security Analysis of “A Novel Elliptic Curve Dynamic Access Control System” -- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions -- Feature Extraction for IRIS Recognition -- Bidirectional Quantum Secure Direct Communication Based on Entanglement -- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux -- Research on Streaming Data Integration System about Security Threat Monitor -- Using Honeypots to Secure E-Government Networks -- Trust-Risk-Game Based Access Control in Cross Domain Application -- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis -- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment -- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework -- A Secured Technique for Image Data Hiding.

There are no comments on this title.

to post a comment.

Maintained by VTU Library