Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/fgit/sectech2009.bht:"
@inproceedings{DBLP:conf/fgit/AhmadinejadJ09, author = {Seyed Hossein Ahmadinejad and Saeed Jalili}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {18--25}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_3}, doi = {10.1007/978-3-642-10847-1\_3}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AhmadinejadJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AlmazyadA09, author = {Abdulaziz S. Almazyad and Yasir Ahmad}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {A New Approach in {T-FA} Authentication with {OTP} Using Mobile Phone}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {9--17}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_2}, doi = {10.1007/978-3-642-10847-1\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AlmazyadA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/BhattacharyyaDBK09, author = {Debnath Bhattacharyya and Poulami Das and Samir Kumar Bandyopadhyay and Tai{-}Hoon Kim}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Analysis of Handwritten Signature Image}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {43--50}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_6}, doi = {10.1007/978-3-642-10847-1\_6}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/BhattacharyyaDBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/BhattacharyyaDBK09a, author = {Debnath Bhattacharyya and Poulami Das and Samir Kumar Bandyopadhyay and Tai{-}Hoon Kim}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Grayscale Image Classification Using Supervised Chromosome Clustering}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {64--71}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_9}, doi = {10.1007/978-3-642-10847-1\_9}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/BhattacharyyaDBK09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/CarvalhoPF09, author = {David A. Carvalho and Manuela Pereira and M{\'{a}}rio M. Freire}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {265--272}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_33}, doi = {10.1007/978-3-642-10847-1\_33}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/CarvalhoPF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/ChengYLCW09, author = {Jieren Cheng and Jianping Yin and Yun Liu and Zhiping Cai and Chengkun Wu}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {132--139}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_17}, doi = {10.1007/978-3-642-10847-1\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/ChengYLCW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/ChengZYLC09, author = {Jieren Cheng and Boyun Zhang and Jianping Yin and Yun Liu and Zhiping Cai}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {DDoS Attack Detection Using Three-State Partition Based on Flow Interaction}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {176--184}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_22}, doi = {10.1007/978-3-642-10847-1\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/ChengZYLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/ChinHG09, author = {Ji{-}Jian Chin and Swee{-}Huay Heng and Bok{-}Min Goi}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Hierarchical Identity-Based Identification Schemes}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {93--99}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_12}, doi = {10.1007/978-3-642-10847-1\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/ChinHG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/ChungHK09, author = {Bo{-}heung Chung and Min{-}ho Han and Ki{-}young Kim}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {51--56}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_7}, doi = {10.1007/978-3-642-10847-1\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/ChungHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/DrahanskyOH09, author = {Martin Drahansk{\'{y}} and Filip Ors{\'{a}}g and Petr Han{\'{a}}cek}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Accelerometer Based Digital Video Stabilization for Security Surveillance Systems}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {225--233}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_28}, doi = {10.1007/978-3-642-10847-1\_28}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/DrahanskyOH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/GunawanHK09, author = {Linda Ariani Gunawan and Peter Herrmann and Frank Alexander Kraemer}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {72--85}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_10}, doi = {10.1007/978-3-642-10847-1\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/GunawanHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/HongKC09, author = {Jaeseung Hong and Jongwung Kim and Jeonghun Cho}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {The Trend of the Security Research for the Insider Cyber Threat}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {100--107}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_13}, doi = {10.1007/978-3-642-10847-1\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/HongKC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/HuangCF09, author = {Hsiang{-}Cheh Huang and Feng{-}Cheng Chang and Wai{-}Chi Fang}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Applications of Reversible Data Hiding Techniques with the Quick Response Codes}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {1--8}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_1}, doi = {10.1007/978-3-642-10847-1\_1}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/HuangCF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/IraniW09, author = {Mohammad Tabatabai Irani and Edgar R. Weippl}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Automation of Post-exploitation - (Focused on MS-Windows Targets)}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {250--257}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_31}, doi = {10.1007/978-3-642-10847-1\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/IraniW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/IslamK09a, author = {Mohammad Rakibul Islam and Jinsang Kim}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {{MIMO} Wiretap Channel: {A} Scalar Approach}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {108--115}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_14}, doi = {10.1007/978-3-642-10847-1\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/IslamK09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/JeongHL09, author = {Jae{-}goo Jeong and Seung{-}yong Hur and Gang{-}Soo Lee}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {A Development of Finite State Machine Create Tool for Cryptography Module Validation}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {185--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_23}, doi = {10.1007/978-3-642-10847-1\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/JeongHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/JinWX09, author = {Haimin Jin and Duncan S. Wong and Yinlong Xu}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Efficient Group Signature with Forward Secure Revocation}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {124--131}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_16}, doi = {10.1007/978-3-642-10847-1\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/JinWX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KangJK09, author = {DongHo Kang and BoHeung Jung and KiYoung Kim}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Hardware Based Data Inspection for {USB} Data Leakage Prevention}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {57--63}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_8}, doi = {10.1007/978-3-642-10847-1\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KangJK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/King09, author = {Brian King}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {A Simple Encryption Scheme for Binary Elliptic Curves}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {273--280}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_34}, doi = {10.1007/978-3-642-10847-1\_34}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/King09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KiskuGS09, author = {Dakshina Ranjan Kisku and Phalguni Gupta and Jamuna Kanta Sing}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {157--164}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_20}, doi = {10.1007/978-3-642-10847-1\_20}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KiskuGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KiskuGS09a, author = {Dakshina Ranjan Kisku and Phalguni Gupta and Jamuna Kanta Sing}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Fusion of Multiple Matchers Using {SVM} for Offline Signature Identification}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {201--208}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_25}, doi = {10.1007/978-3-642-10847-1\_25}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KiskuGS09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KoCR09, author = {Hoon Ko and Jongmyung Choi and Carlos Ramos}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {A Study on Secure Contents Using in Urban Computing}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {26--34}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_4}, doi = {10.1007/978-3-642-10847-1\_4}, timestamp = {Tue, 21 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/KoCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/LiuJHLY09, author = {Tie{-}Ming Liu and Liehui Jiang and Hongqi He and Ji{-}zhong Li and Xian Yu}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {140--147}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_18}, doi = {10.1007/978-3-642-10847-1\_18}, timestamp = {Mon, 23 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/LiuJHLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/OgielaO09, author = {Marek R. Ogiela and Urszula Ogiela}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Shadow Generation Protocol in Linguistic Threshold Schemes}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {35--42}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_5}, doi = {10.1007/978-3-642-10847-1\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/OgielaO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/Orsag09, author = {Filip Ors{\'{a}}g}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Speaker Dependent Frequency Cepstrum Coefficients}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {258--264}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_32}, doi = {10.1007/978-3-642-10847-1\_32}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/Orsag09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/PechoNHD09, author = {Peter Pecho and Jan Nagy and Petr Han{\'{a}}cek and Martin Drahansk{\'{y}}}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {217--224}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_27}, doi = {10.1007/978-3-642-10847-1\_27}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/PechoNHD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/RahimM09, author = {Aneel Rahim and Fahad bin Muyaha}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Impact of Malicious Node on Broadcast Schemes}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {86--92}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_11}, doi = {10.1007/978-3-642-10847-1\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/RahimM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/RajuVNRB09, author = {M. S. V. S. Bhadri Raju and B. Vishnu Vardhan and G. A. Naidu and L. Pratap Reddy and A. Vinaya Babu}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Analysis of Text Complexity in a Crypto System - {A} Case Study on Telugu}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {281--288}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_35}, doi = {10.1007/978-3-642-10847-1\_35}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/RajuVNRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/RoblesC09, author = {Rosslin John Robles and Min{-}Kyu Choi}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Symmetric-Key Encryption for Wireless Internet {SCADA}}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {289--297}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_36}, doi = {10.1007/978-3-642-10847-1\_36}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/RoblesC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/ThorncharoensriHSAMW09, author = {Pairat Thorncharoensri and Qiong Huang and Willy Susilo and Man Ho Au and Yi Mu and Duncan S. Wong}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Escrowed Deniable Identification Schemes}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {234--241}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_29}, doi = {10.1007/978-3-642-10847-1\_29}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/ThorncharoensriHSAMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/TianSH09, author = {Yuan Tian and Biao Song and Eui{-}nam Huh}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {193--200}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_24}, doi = {10.1007/978-3-642-10847-1\_24}, timestamp = {Fri, 10 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/TianSH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/WeiZRZSL09, author = {Yonglong Wei and Xiaojuan Zheng and Jinglei Ren and Xudong Zheng and Chen Sun and Zhenhao Li}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {148--156}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_19}, doi = {10.1007/978-3-642-10847-1\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/WeiZRZSL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/WuYCZC09, author = {Chengkun Wu and Jianping Yin and Zhiping Cai and En Zhu and Jieren Cheng}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core {GPU}}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {298--305}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_37}, doi = {10.1007/978-3-642-10847-1\_37}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/WuYCZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/YanLLD09, author = {Qiang Yan and Yingjiu Li and Tieyan Li and Robert H. Deng}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Insights into Malware Detection and Prevention on Mobile Phones}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {242--249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_30}, doi = {10.1007/978-3-642-10847-1\_30}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/YanLLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/YoonJL09, author = {Seokung Yoon and Hyuncheol Jung and Kyung{-}Seok Lee}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {165--175}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_21}, doi = {10.1007/978-3-642-10847-1\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/YoonJL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/ZhaiNYTLY09, author = {Gaoshou Zhai and Hanhui Niu and Na Yang and Minli Tian and Chengyu Liu and Hengsheng Yang}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Security Testing for Operating System and Its System Calls}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {116--123}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_15}, doi = {10.1007/978-3-642-10847-1\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/ZhaiNYTLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/Ziauddin09, author = {Sheikh Ziauddin}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {209--216}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_26}, doi = {10.1007/978-3-642-10847-1\_26}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/Ziauddin09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fgit/2009sectech, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1}, doi = {10.1007/978-3-642-10847-1}, isbn = {978-3-642-10846-4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/2009sectech.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.