Skip to main content
  • Conference proceedings
  • © 2012

Computer Applications for Security, Control and System Engineering

International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Communications in Computer and Information Science (CCIS, volume 339)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (65 papers)

  1. Front Matter

  2. Novel Compositing Method for Quantification of Wireless Network Security

    • Sungmo Jung, Jong Hyun Kim, Seoksoo Kim
    Pages 1-6
  3. Obfuscation Method for Location Trajectory

    • Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
    Pages 7-13
  4. Performance of Physical Unclonable Functions with Shift-Register-Based Post-processing

    • Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh
    Pages 14-21
  5. A Pseudo State-Based Distributed DoS Detection Mechanism Using Dynamic Hashing

    • PyungKoo Park, SeongMin Yoo, Su-il Choi, Jaehyung Park, Ho Yong Ryu, JaeCheol Ryou
    Pages 22-29
  6. An Engineering Environment for Supporting Information Security Management Systems

    • Ahmad Iqbal Hakim Suhaimi, Yuichi Goto, Jingde Cheng
    Pages 30-37
  7. Modeling Multiple Modes of Operation with Alloy

    • Christos Kalyvas, Elisavet Konstantinou, Georgios Kambourakis
    Pages 78-85
  8. Design and Implementation of IVEF Protocol Using Wireless Communication on Android Mobile Platform

    • Kyunghwan Kim, Byung-Doo Kim, Byunggil Lee, Namje Park
    Pages 94-100
  9. Security Issues and Threats According to the Attribute of Cloud Computing

    • Hyangjin Lee, Jeeyeon Kim, Youngsook Lee, Dongho Won
    Pages 101-108

About this book

This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.

Editors and Affiliations

  • GVSA and University of Tasmania, Hobart, Australia

    Tai-hoon Kim

  • Jet Propulsion Laboratory/Caltech, NASA, Pasadena, USA

    Adrian Stoica

  • National Chiao Tung University, Hsinchu, Taiwan, R.O.C.

    Wai-chi Fang

  • University of Western Macedonia, Kozani, Greece

    Thanos Vasilakos

  • Universidad Complutense de Madrid, Madrid, Spain

    Javier García Villalba

  • Mississippi State University, USA

    Kirk P. Arnett

  • King Saud University, Riyadh, Kingdom of Saudi Arabia

    Muhammad Khurram Khan

  • School of Computing and Information System, University of Tasmania, Hobart, Australia

    Byeong-Ho Kang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access