000 03181nam a22005655i 4500
001 978-3-642-10240-0
003 DE-He213
005 20170628035143.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783642102400
_9978-3-642-10240-0
024 7 _a10.1007/978-3-642-10240-0
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
100 1 _aKim, Haeng-kon.
_eeditor.
245 1 0 _aAdvances in Security Technology
_h[electronic resource] :
_bInternational Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers /
_cedited by Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2009.
300 _aXII, 161 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0929 ;
_v29
505 0 _aSecurity Analysis of “A Novel Elliptic Curve Dynamic Access Control System” -- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions -- Feature Extraction for IRIS Recognition -- Bidirectional Quantum Secure Direct Communication Based on Entanglement -- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux -- Research on Streaming Data Integration System about Security Threat Monitor -- Using Honeypots to Secure E-Government Networks -- Trust-Risk-Game Based Access Control in Cross Domain Application -- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis -- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment -- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework -- A Secured Technique for Image Data Hiding.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aSoftware engineering.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aSystems and Data Security.
650 2 4 _aCoding and Information Theory.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aSpecial Purpose and Application-Based Systems.
650 2 4 _aComputer Communication Networks.
700 1 _aKim, Tai-hoon.
_eeditor.
700 1 _aKiumi, Akingbehin.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642102394
830 0 _aCommunications in Computer and Information Science,
_x1865-0929 ;
_v29
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-10240-0
912 _aZDB-2-SCS
999 _c23224
_d23224