


default search action
2nd FGIT-SecTech/DRBC 2010: Jeju Island, Korea
- Tai-Hoon Kim, Wai-Chi Fang, Muhammad Khurram Khan

, Kirk P. Arnett, Heau-Jo Kang, Dominik Slezak:
Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 122, Springer 2010, ISBN 978-3-642-17609-8 - Davrondzhon Gafurov, Patrick Bours, Bian Yang, Christoph Busch:

Impact of Finger Type in Fingerprint Authentication. 1-7 - Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan

, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Using Arabic CAPTCHA for Cyber Security. 8-17 - Syed Irfan Nabi

, Abdulrahman A. Mirza
, Khaled Alghathbar:
Information Assurance in Saudi Organizations - An Empirical Study. 18-28 - Davrondzhon Gafurov:

Emerging Biometric Modalities: Challenges and Opportunities. 29-38 - Ju-Sung Kang, Okyeon Yi:

On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP. 39-46 - Syed Irfan Nabi, Syed Waqar Nabi, Syed Awais Ahmed Tipu, Bushra Haqqi, Zahra Abid, Khaled Alghathbar:

Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan. 47-56 - Kenji Yamamoto, Toshihiro Yamauchi

:
Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON. 57-67 - Bo-heung Chung, Jung-nye Kim:

Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device. 68-73 - Intae Kim, Keewook Rim, Junghyun Lee:

Secure OSGi Platform against Service Injection. 74-83 - Toshihiro Yamauchi

, Takayuki Hara, Hideo Taniguchi:
A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse. 84-93 - Hong-bin Yim, Jae-Il Jung:

Probabilistic Route Selection Algorithm for IP Traceback. 94-103 - Pranab Kumar Dhar, Mohammad Ibrahim Khan, Cheol Hong Kim, Jong-Myon Kim:

An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection. 104-113 - Pranab Kumar Dhar, Cheol Hong Kim, Jong-Myon Kim:

Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model. 114-125 - Hsiang-Cheh Huang

, Ting-Hsuan Wang, Wai-Chi Fang:
Histogram-Based Reversible Data Hiding with Quadtree Concepts. 126-133 - Taehyoung Kim, Inhyuk Kim, Changwoo Min, Young Ik Eom:

MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology. 134-141 - Jemal H. Abawajy, Tai-Hoon Kim:

Performance Analysis of Cyber Security Awareness Delivery Methods. 142-148 - Wei-Chuen Yau, Raphael C.-W. Phan

, Swee-Huay Heng
, Bok-Min Goi
:
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms. 149-160 - Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan

, Khaled Alghathbar:
One-Time Password System with Infinite Nested Hash Chains. 161-170 - Hoon Ko

, Zita A. Vale
:
Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence. 171-178 - Davrondzhon Gafurov, Patrick Bours:

Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor. 179-186 - Dakshina Ranjan Kisku

, Phalguni Gupta, Jamuna Kanta Sing:
Fusion of Moving and Static Facial Features for Robust Face Recognition. 187-196 - Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:

Human Authentication Based on ECG Waves Using Radon Transform. 197-206 - Mushtaq Ahmad:

Wireless Network Security Vulnerabilities and Concerns. 207-219 - Nagaraj Ambika

, G. T. Raju:
Figment Authentication Scheme in Wireless Sensor Network. 220-223 - Zeeshan Shafi Khan

, Khaled Alghathbar, Muhammad Sher
, Khalid Rashid:
Issues of Security and Network Load in Presence - A Survey. 224-230 - Aneel Rahim, Fahad Bin Muhaya:

Discovering the Botnet Detection Techniques. 231-235 - Muhammad Imran Razzak

, Muhammad Khurram Khan, Khaled Alghathbar:
Contactless Biometrics in Wireless Sensor Network: A Survey. 236-243 - Abdullah Sharaf Alghamdi, Syed Amanullah Quadri, Iftikhar Ahmad, Khalid Al-Nafjan:

A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems. 244-249 - A. J. Clark, Patton Holliday, Robyn Chau, Harris Eisenberg, Melinda Chau:

Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010. 250-258 - Wei Huang, Arthur Mynnet:

Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model. 259-268 - Rosslin John Robles

, Haeng-Kon Kim, Tai-Hoon Kim:
Internet SCADA Utilizing API's as Data Source. 269-275 - Maricel O. Balitanas, Tai-Hoon Kim:

Insecure Information System's Solution Using Isolation Method. 276-281 - Rosslin John Robles

, Tai-Hoon Kim:
Communication Security for Control Systems in Smart Grid. 282-289 - Raed Alosaimy, Khaled Alghathbar, Alaaeldin M. Hafez, Mohamed Hamdy Eldefrawy:

NMACA Approach Used to Build a Secure Message Authentication Code. 290-298

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














