Logo - springer
Slogan - springer

Computer Science - Communication Networks | Advances in Information Security and Assurance - Third International Conference and Workshops,

Advances in Information Security and Assurance

Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

Park, J.(.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Yeo, S.-S. (Eds.)

2009, XXXII, 841 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$149.00

(net) price for USA

ISBN 978-3-642-02617-1

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$189.00

(net) price for USA

ISBN 978-3-642-02616-4

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009.

The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009.

Content Level » Research

Keywords » authentication - cryptographic hardware - data security - e-health - fingerprint detection - firewall - identity management - key exchange - network security - privacy - radio-frequency identification (RFID) - sensor networks - ubiquitous computing - ubiquitous environments - wireless networks

Related subjects » Communication Networks - Security and Cryptology

Table of contents 

Cryptographic Algorithms.- Update on SEED: SEED-192/256.- A New Double-Block-Length Hash Function Using Feistel Structure.- Authentication and Identity Management.- The Dark Side of Timed Opacity.- Certificateless Signature Scheme without Random Oracles.- Authorization and Access Control.- Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker.- Grouping Provenance Information to Improve Efficiency of Access Control.- Tagging the Turtle: Local Attestation for Kiosk Computing.- Selective Regression Test for Access Control System Employing RBAC.- Formal Verification for Access Control in Web Information Sharing System.- Biometrics and Computer Forensics.- Adaptive Iris Segmentation.- Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person.- Methodology and Tools of IS Audit and Computer Forensics – The Common Denominator.- Cryptographic Protocols.- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?.- A New Strongly Secure Authenticated Key Exchange Protocol.- Improved Implementations of Cryptosystems Based on Tate Pairing.- Efficient Secure Multiparty Computation Protocol in Asynchronous Network.- Data Integrity and Privacy.- Clustering-Based Frequency l-Diversity Anonymization.- Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery.- A Kademlia-Based Node Lookup System for Anonymization Networks.- Key Management and Recovery.- A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network.- Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN.- Mobile and RFID Network Security.- Securing Mobile Phone Calls with Identity-Based Cryptography.- On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS).- Firewall, IDS, Anti-virus, and Other Security Products.- A New Approach to Malware Detection.- ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION.- A Deployment Value Model for Intrusion Detection Sensors.- Internet and Web Services Security.- Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks.- Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach.- Cyber-attack and Cyber-terrorism.- Signaling-Oriented DoS Attacks in UMTS Networks.- Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average.- Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems.- Other Security Research.- Efficient and Automatic Instrumentation for Packed Binaries.- Secure Cover Selection Steganography.- Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects.- Performance Analysis of Digital Secure Voice Transmission over HF Radio Channel.- Energy Analysis of Multimedia Video Streaming on Mobile Devices.- Combating Index Poisoning in P2P File Sharing.- A Cryptanalytic View of the NSA’s Skipjack Block Cipher Design.- MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem.- Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network.- Design and Delivery of Undergraduate IT Security Management Course.- MoWiN 2009.- Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data.- Using a Link Metric to Improve Communication Mechanisms and Real-Time Properties in an Adaptive Middleware for Heterogeneous Sensor Networks.- Performance Evaluation of DSR in Multi-services Ad Hoc Networks.- Implementation and Evaluation of WiMedia MAC LSI.- A Reliable and Efficient Pedal Back Data Disseminating Scheme for Ad-Hoc WSNs.- Improved Location Acquisition Algorithms for the Location-Based Alert Service.- An Enhanced Trust Center Based Authentication in ZigBee Networks.- Sensor Disposition Problem in Wireless Ad-Hoc Sensor Networks.- Performance Evaluation of Cost Effective Routing for Packet Transmissions in Mobile Ad Hoc Networks.- Energy Lesser Broadcasting Algorithms Using Adjustable Transmission Ranges in Mobile Ad Hoc Networks.- A Multi-Path Routing Supported Scheduling Algorithm for Multi-Channel Single-Transceiver Wireless Mesh Networks.- Predictive Scheme for Location Service in Mobile Ad-Hoc Networks.- An Efficient Hybrid Routing Approach for Hybrid Wireless Mesh Networks.- Relationship between Motivation and Satisfaction of Online Computer Games: Evidence from Adolescent Players Using Wireless Service in Taiwan.- DISHES: A Distributed Shell System for Ubiquitous Computing.- Error Control Scheme of Hybrid ARQ Based on Majority Voting Bit by Bit.- Secure Error-Correction Network Coding in a Randomized Setting.- Bayesian Approach Based Comment Spam Defending Tool.- NASSUE 2009.- An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme.- Honeybee-Based Model to Detect Intrusion.- A Data Mining Framework for Building Intrusion Detection Models Based on IPv6.- FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191).- A Forward-Secrecy WTLS Handshake Protocol Based on XTR.- Application of 2D Barcode in Hardcopy Document Verification System.- Protecting Global SOA from DoS and Other Security Threats.- CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme.- HOTP-Based User Authentication Scheme in Home Networks.- IAWSN 2009.- A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment.- A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks.- A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment.- A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks.- Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks.- Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs).- Authenticated Encryption in WSN Using eSTREAM Ciphers.- WNGS 2009 and CGMS 2009.- Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles.- Device Authentication/Authorization Protocol for Home Network in Next Generation Security.- A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services.- Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method.- A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC.- Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting.- Free-Form Deformation Axis Aligned Bounding Box.- SHCI-ISA 2009.- A Study on Mosaic Based CCTV System Using Localization.- Selecting the Wireless Communication Methods for Establishing Ubiquitous City-Gas Facilities in Korea.- Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Communication Networks.