


default search action
1st FGIT-SecTech 2009: Jeju Island, Korea
- Dominik Slezak, Tai-Hoon Kim, Wai-Chi Fang, Kirk P. Arnett:

Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 58, Springer 2009, ISBN 978-3-642-10846-4 - Hsiang-Cheh Huang

, Feng-Cheng Chang
, Wai-Chi Fang:
Applications of Reversible Data Hiding Techniques with the Quick Response Codes. 1-8 - Abdulaziz S. Almazyad

, Yasir Ahmad:
A New Approach in T-FA Authentication with OTP Using Mobile Phone. 9-17 - Seyed Hossein Ahmadinejad, Saeed Jalili

:
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows. 18-25 - Hoon Ko

, Jongmyung Choi
, Carlos Ramos
:
A Study on Secure Contents Using in Urban Computing. 26-34 - Marek R. Ogiela, Urszula Ogiela:

Shadow Generation Protocol in Linguistic Threshold Schemes. 35-42 - Debnath Bhattacharyya

, Poulami Das, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Analysis of Handwritten Signature Image. 43-50 - Bo-heung Chung, Min-ho Han, Ki-young Kim:

The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device. 51-56 - DongHo Kang, BoHeung Jung, KiYoung Kim:

Hardware Based Data Inspection for USB Data Leakage Prevention. 57-63 - Debnath Bhattacharyya

, Poulami Das, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Grayscale Image Classification Using Supervised Chromosome Clustering. 64-71 - Linda Ariani Gunawan, Peter Herrmann

, Frank Alexander Kraemer:
Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models. 72-85 - Aneel Rahim, Fahad bin Muyaha:

Impact of Malicious Node on Broadcast Schemes. 86-92 - Ji-Jian Chin

, Swee-Huay Heng, Bok-Min Goi
:
Hierarchical Identity-Based Identification Schemes. 93-99 - Jaeseung Hong, Jongwung Kim, Jeonghun Cho:

The Trend of the Security Research for the Insider Cyber Threat. 100-107 - Mohammad Rakibul Islam, Jinsang Kim:

MIMO Wiretap Channel: A Scalar Approach. 108-115 - Gaoshou Zhai, Hanhui Niu, Na Yang, Minli Tian, Chengyu Liu, Hengsheng Yang:

Security Testing for Operating System and Its System Calls. 116-123 - Haimin Jin, Duncan S. Wong, Yinlong Xu:

Efficient Group Signature with Forward Secure Revocation. 124-131 - Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Chengkun Wu:

Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion. 132-139 - Tie-Ming Liu, Liehui Jiang, Hongqi He, Ji-zhong Li, Xian Yu:

Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code. 140-147 - Yonglong Wei, Xiaojuan Zheng, Jinglei Ren, Xudong Zheng, Chen Sun, Zhenhao Li:

Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code. 148-156 - Dakshina Ranjan Kisku

, Phalguni Gupta, Jamuna Kanta Sing:
Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature. 157-164 - Seokung Yoon, Hyuncheol Jung, Kyung-Seok Lee:

A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network. 165-175 - Jieren Cheng, Boyun Zhang, Jianping Yin, Yun Liu, Zhiping Cai:

DDoS Attack Detection Using Three-State Partition Based on Flow Interaction. 176-184 - Jae-goo Jeong, Seung-yong Hur, Gang-Soo Lee:

A Development of Finite State Machine Create Tool for Cryptography Module Validation. 185-192 - Yuan Tian, Biao Song, Eui-nam Huh:

A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments. 193-200 - Dakshina Ranjan Kisku

, Phalguni Gupta, Jamuna Kanta Sing:
Fusion of Multiple Matchers Using SVM for Offline Signature Identification. 201-208 - Sheikh Ziauddin

:
A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card. 209-216 - Peter Pecho, Jan Nagy, Petr Hanácek

, Martin Drahanský
:
Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors. 217-224 - Martin Drahanský

, Filip Orság
, Petr Hanácek
:
Accelerometer Based Digital Video Stabilization for Security Surveillance Systems. 225-233 - Pairat Thorncharoensri

, Qiong Huang, Willy Susilo
, Man Ho Au
, Yi Mu, Duncan S. Wong:
Escrowed Deniable Identification Schemes. 234-241 - Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng

:
Insights into Malware Detection and Prevention on Mobile Phones. 242-249 - Mohammad Tabatabai Irani, Edgar R. Weippl:

Automation of Post-exploitation - (Focused on MS-Windows Targets). 250-257 - Filip Orság

:
Speaker Dependent Frequency Cepstrum Coefficients. 258-264 - David A. Carvalho, Manuela Pereira

, Mário M. Freire
:
Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection. 265-272 - Brian King:

A Simple Encryption Scheme for Binary Elliptic Curves. 273-280 - M. S. V. S. Bhadri Raju, B. Vishnu Vardhan

, G. A. Naidu, L. Pratap Reddy, A. Vinaya Babu:
Analysis of Text Complexity in a Crypto System - A Case Study on Telugu. 281-288 - Rosslin John Robles

, Min-Kyu Choi:
Symmetric-Key Encryption for Wireless Internet SCADA. 289-297 - Chengkun Wu, Jianping Yin, Zhiping Cai, En Zhu, Jieren Cheng:

An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU. 298-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














