


default search action
3rd FGIT-SecTech 2011: Jeju Island, Korea
- Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, L. Javier García-Villalba, Kirk P. Arnett, Muhammad Khurram Khan

:
Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 259, Springer 2011, ISBN 978-3-642-27188-5 - Ju-Sung Kang, Dowon Hong

:
On Fast Private Scalar Product Protocols. 1-10 - Vivy Suhendra:

A Survey on Access Control Deployment. 11-20 - Shinsaku Kiyomoto, Kazuhide Fukushima

, Yutaka Miyake:
Data Anonymity in Multi-Party Service Model. 21-30 - Yu Chen, Vrizlynn L. L. Thing:

A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification. 31-42 - Yindong Chen:

A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic Immunity. 43-52 - Vrizlynn L. L. Thing, Wee-Yong Lim, Junming Zeng, Darell J. J. Tan, Yu Chen:

Design of a Modular Framework for Noisy Logo Classification in Fraud Detection. 53-64 - Yi-Ming Chen, Cheng-En Chuang, Hsu-Che Liu, Cheng-Yi Ni, Chun-Tang Wang:

Using Agent in Virtual Machine for Interactive Security Training. 65-74 - Theodosios Tsiakis

, Aristeidis Chatzipoulidis
, Theodoros Kargidis, Athanasios Belidis:
Information Technology Security Governance Approach Comparison in E-banking. 75-84 - Lamiaa M. El Bakrawy

, Neveen I. Ghali
, Aboul Ella Hassanien
, Tai-Hoon Kim:
A Fast and Secure One-Way Hash Function. 85-93 - Rahul Saha

, G. Geetha
, Gang-soo Lee:
CLAPTCHA- A Novel Captcha. 94-100 - Gulshan Kumar

, Mritunjay Kumar Rai, Gang-soo Lee:
An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher. 101-112 - Dominik Malcik, Martin Drahanský

:
Microscopic Analysis of Chips. 113-122 - Bo Zhang

:
An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model. 123-127 - Pranab Kumar Dhar, Mohammad Ibrahim Khan, Sunil Dhar, Jong-Myon Kim:

Robust Audio Watermarking Scheme Based on Short Time Fourier Transformation and Singular Value Decomposition. 128-138 - Sunguk Lee, Taeheon Kang, Rosslin John Robles

, Sung-gyu Kim, Byungjoo Park:
A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks. 139-145 - David Rebollo-Monedero

, Javier Parra-Arnau, Jordi Forné
:
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval. 146-154 - Panayotis E. Nastou, Yannis C. Stamatiou

:
A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs. 155-166 - Hae-Jung Kim, Eun-Jun Yoon:

Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol. 167-176 - Guo-Hui Zhou:

An Effective Distance-Computing Method for Network Anomaly Detection. 177-182 - Danilo Valeros Bernardo, Doan B. Hoang:

Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT. 183-194 - Heba F. Eid

, Mostafa A. Salama
, Aboul Ella Hassanien
, Tai-Hoon Kim:
Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification. 195-203 - Yuan Tian, Biao Song, Eui-nam Huh:

A Parameterized Privacy-Aware Pub-sub System in Smart Work. 204-214 - Ruo Ando, Kuniyasu Suzaki:

A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation. 215-227 - Abdelouahed Gherbi

, Robert Charpentier:
Diversity-Based Approaches to Software Systems Security. 228-237

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














