Logo - springer
Slogan - springer

Computer Science - Communication Networks | Advances in Information Security and Its Application - Third International Conference, ISA 2009,

Advances in Information Security and Its Application

Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

Park, J.(.H., Zhan, J., Lee, C., Wang, G., Yeo, S.-S. (Eds.)

2009, X, 127 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$89.99

(net) price for USA

ISBN 978-3-642-02633-1

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$119.00

(net) price for USA

ISBN 978-3-642-02632-4

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009.

The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application; security protocol and its application, other security research.

Content Level » Research

Keywords » Firewall - ISDF - authentication - cryptographic hardware - data security - fingerprint detection - hardware token - key exchange - manet - networks - role-based access - security - security metrics - security patterns - worm

Related subjects » Communication Networks - Security and Cryptology

Table of contents 

Information Assurance and Its Application.- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections.- A Security Metrics Development Method for Software Intensive Systems.- The ISDF Framework: Integrating Security Patterns and Best Practices.- Security Protocol and Its Application.- Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server.- Concurrency and Time in Role-Based Access Control.- Performance Assessment Method for a Forged Fingerprint Detection Algorithm.- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings.- A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes.- Context-Based E-Health System Access Control Mechanism.- Analysis of a Mathematical Model for Worm Virus Propagation.- Other Security Research.- A Contents Encryption Mechanism Using Reused Key in IPTV.- High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform.- Experiment Research of Automatic Deception Model Based on Autonomic Computing.- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks.- Reconsidering Data Logging in Light of Digital Forensics.- Blurriness in Live Forensics: An Introduction.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Communication Networks.