default search action
3rd FGIT-SecTech 2011: Jeju Island, Korea
- Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, L. Javier García-Villalba, Kirk P. Arnett, Muhammad Khurram Khan:
Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Communications in Computer and Information Science 259, Springer 2011, ISBN 978-3-642-27188-5 - Ju-Sung Kang, Dowon Hong:
On Fast Private Scalar Product Protocols. 1-10 - Vivy Suhendra:
A Survey on Access Control Deployment. 11-20 - Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Data Anonymity in Multi-Party Service Model. 21-30 - Yu Chen, Vrizlynn L. L. Thing:
A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification. 31-42 - Yindong Chen:
A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic Immunity. 43-52 - Vrizlynn L. L. Thing, Wee-Yong Lim, Junming Zeng, Darell J. J. Tan, Yu Chen:
Design of a Modular Framework for Noisy Logo Classification in Fraud Detection. 53-64 - Yi-Ming Chen, Cheng-En Chuang, Hsu-Che Liu, Cheng-Yi Ni, Chun-Tang Wang:
Using Agent in Virtual Machine for Interactive Security Training. 65-74 - Theodosios Tsiakis, Aristeidis Chatzipoulidis, Theodoros Kargidis, Athanasios Belidis:
Information Technology Security Governance Approach Comparison in E-banking. 75-84 - Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Tai-Hoon Kim:
A Fast and Secure One-Way Hash Function. 85-93 - Rahul Saha, G. Geetha, Gang-soo Lee:
CLAPTCHA- A Novel Captcha. 94-100 - Gulshan Kumar, Mritunjay Kumar Rai, Gang-soo Lee:
An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher. 101-112 - Dominik Malcik, Martin Drahanský:
Microscopic Analysis of Chips. 113-122 - Bo Zhang:
An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model. 123-127 - Pranab Kumar Dhar, Mohammad Ibrahim Khan, Sunil Dhar, Jong-Myon Kim:
Robust Audio Watermarking Scheme Based on Short Time Fourier Transformation and Singular Value Decomposition. 128-138 - Sunguk Lee, Taeheon Kang, Rosslin John Robles, Sung-gyu Kim, Byungjoo Park:
A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks. 139-145 - David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forné:
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval. 146-154 - Panayotis E. Nastou, Yannis C. Stamatiou:
A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs. 155-166 - Hae-Jung Kim, Eun-Jun Yoon:
Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol. 167-176 - Guo-Hui Zhou:
An Effective Distance-Computing Method for Network Anomaly Detection. 177-182 - Danilo Valeros Bernardo, Doan B. Hoang:
Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT. 183-194 - Heba F. Eid, Mostafa A. Salama, Aboul Ella Hassanien, Tai-Hoon Kim:
Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification. 195-203 - Yuan Tian, Biao Song, Eui-nam Huh:
A Parameterized Privacy-Aware Pub-sub System in Smart Work. 204-214 - Ruo Ando, Kuniyasu Suzaki:
A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation. 215-227 - Abdelouahed Gherbi, Robert Charpentier:
Diversity-Based Approaches to Software Systems Security. 228-237
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.