Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

Author:   Akingbehin Kiumi ,  Tai-hoon Kim ,  Akingbehin Kiumi
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2009 ed.
Volume:   29
ISBN:  

9783642102394


Pages:   161
Publication Date:   02 November 2009
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $221.76 Quantity:  
Add to Cart

Share |

Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers


Add your own review!

Overview

Full Product Details

Author:   Akingbehin Kiumi ,  Tai-hoon Kim ,  Akingbehin Kiumi
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2009 ed.
Volume:   29
Dimensions:   Width: 15.50cm , Height: 1.00cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642102394


ISBN 10:   3642102395
Pages:   161
Publication Date:   02 November 2009
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Security Analysis of A Novel Elliptic Curve Dynamic Access Control System .- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions.- Feature Extraction for IRIS Recognition.- Bidirectional Quantum Secure Direct Communication Based on Entanglement.- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux.- Research on Streaming Data Integration System about Security Threat Monitor.- Using Honeypots to Secure E-Government Networks.- Trust-Risk-Game Based Access Control in Cross Domain Application.- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis.- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment.- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework.- A Secured Technique for Image Data Hiding.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List