Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) – two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 250 papers submitted to SecTech/DRBC 2010. The submitted papers went through a rigorous reviewing process: 395 of the 1,630 papers were accepted for FGIT 2010, while 57 papers were accepted for SecTech/DRBC 2010. Of the 250 papers 10 were selected for the special FGIT 2010 volume published by Springer in the LNCS series. 34 papers are published in this volume, and 13 papers were wi- drawn due to technical reasons. We would like to acknowledge the great effort of the SecTech/DRBC 2010 Int- national Advisory Boards and members of the International Program Committees, as well as all the organizations and individuals who supported the idea of publishing this volume of proceedings, including SERSC and Springer. Also, the success of these two conferences would not have been possible without the huge support from our sponsors and the work of the Chairs and Organizing Committee.
1111361099
Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) – two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 250 papers submitted to SecTech/DRBC 2010. The submitted papers went through a rigorous reviewing process: 395 of the 1,630 papers were accepted for FGIT 2010, while 57 papers were accepted for SecTech/DRBC 2010. Of the 250 papers 10 were selected for the special FGIT 2010 volume published by Springer in the LNCS series. 34 papers are published in this volume, and 13 papers were wi- drawn due to technical reasons. We would like to acknowledge the great effort of the SecTech/DRBC 2010 Int- national Advisory Boards and members of the International Program Committees, as well as all the organizations and individuals who supported the idea of publishing this volume of proceedings, including SERSC and Springer. Also, the success of these two conferences would not have been possible without the huge support from our sponsors and the work of the Chairs and Organizing Committee.
54.99 In Stock
Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

Paperback(2010)

$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) – two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 250 papers submitted to SecTech/DRBC 2010. The submitted papers went through a rigorous reviewing process: 395 of the 1,630 papers were accepted for FGIT 2010, while 57 papers were accepted for SecTech/DRBC 2010. Of the 250 papers 10 were selected for the special FGIT 2010 volume published by Springer in the LNCS series. 34 papers are published in this volume, and 13 papers were wi- drawn due to technical reasons. We would like to acknowledge the great effort of the SecTech/DRBC 2010 Int- national Advisory Boards and members of the International Program Committees, as well as all the organizations and individuals who supported the idea of publishing this volume of proceedings, including SERSC and Springer. Also, the success of these two conferences would not have been possible without the huge support from our sponsors and the work of the Chairs and Organizing Committee.

Product Details

ISBN-13: 9783642176098
Publisher: Springer Berlin Heidelberg
Publication date: 01/19/2011
Series: Communications in Computer and Information Science , #122
Edition description: 2010
Pages: 300
Product dimensions: 0.00(w) x 0.00(h) x 0.03(d)

Table of Contents

Impact of Finger Type in Fingerprint Authentication Davrondzhon Gafurov Patrick Bours Bian Yang Christoph Busch 1

Using Arabic CAPTCHA for Cyber Security Bilal Khan Khaled S. Alghathbar Muhammad Khurram Khan Abdullah M. AlKelabi Abdulaziz AlAjaji 8

Information Assurance in Saudi Organizations - An Empirical Study Syed Irfan Nabi Abdulrahman A. Mirza Khaled Alghathbar 18

Emerging Biometric Modalities: Challenges and Opportunities Davrondzhon Gafurov 29

On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP Ju-Sung Kang Ok-Yeon Yi 39

Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan Syed Irfan Nabi Syed Waqar Nabi Syed Awais Ahmed Tipu Bushra Haqqi Zahra Abid Khaled Alghathbar 47

Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON Kenji Yamamoto Toshihiro Yamauchi 57

Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device Bo-heung Chung Jung-nye Kim 68

Secure OSGi Platform against Service Injection Intae Kim Keewook Rim Junghyun Lee 74

A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse Toshihiro Yamauchi Takayuki Hara Hideo Taniguchi 84

Probabilistic Route Selection Algorithm for IP Traceback Hong-bin Yim Jae-il Jung 94

An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection Pranab Kumar Dhar Mohammad Ibrahim Khan Cheol-Hong Kim Jong-Myon Kim 104

Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model Pranab Kumar Dhar Cheol Hong Kim Jong-Myon Kim 114

Histogram-Based Reversible Data Hiding with Quadtree Concepts Hsiang-Cheh Huang Ting-Hsuan Wang Wai-Chi Fang 126

MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology Taehyoung Kim Inhyuk Kim Changwoo Min Young Ik Eom 134

Performance Analysis of Cyber Security Awareness Delivery Methods Jemal Abawajy Tai-hoon Kim 142

Proxy Re-encryption with Keyword Search: New Definitions and Algorithms Wei-Chuen Yau Raphael C.-W. Phan Swee-Huay Heng Bok-Min Goi 149

One-Time Password System with Infinite Nested Hash Chains Mohamed Hamdy Eldefrawy Muhammad Khurram Khan Khaled Alghathbar 161

Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence Hoon Ko Zita Vale 171

Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor Davrondzhon Gafurov Patrick Bours 179

Fusion of Moving and Static Facial Features for Robust Face Recognition Dakshina Ranjan Kisku Phalguni Gupta Jamuna Kanta Sing 187

Human Authentication Based on ECG Waves Using Radon Transform Chetana Hegde H. Rahul Prabhu D.S. Sagar P. Deepa Shenoy K.R. Venugopal L.M. Patnaik 197

Wireless Network Security Vulnerabilities and Concerns Ahmad Mushtaq 207

Figment Authentication Scheme in Wireless Sensor Network N. Ambika G.T. Raju 220

Issues of Security and Network Load in Presence - A Survey Zeeshan Shafi Khan Khaled Alghathbar Muhammad Sher Khalid Rashid 224

Discovering the Botnet Detection Techniques Aneel Rahim Fahad T. bin Muhaya 231

Contactless Biometrics in Wireless Sensor Network: A Survey Muhammad Imran Razzak Muhammad Khurram Khan Khaled Alghathbar 236

A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems Abdullah S. Alghamdi Syed Amanullah Quadri Iftikhar Ahmad Khalid Al-Nafjan 244

Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010 A.J. Clark Patton Holliday Robyn Chau Harris Eisenberg Melinda Chau 250

Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model Wei Huang Arthur Mynnet 259

Internet SCADA Utilizing API's as Data Source Rosslin John Robles Haeng-kon Kim Tai-hoon Kim 269

Insecure Information System's Solution Using Isolation Method Maricel Balitanas Tai-hoon Kim 276

Communication Security for Control Systems in Smart Grid Rosslin John Robles Tai-hoon Kim 282

NMACA Approach Used to Build a Secure Message Authentication Code Raed Alosaimy Khaled Alghathbar Alaaeldin M. Hafez Mohamed H. Eldefrawy 290

Author Index 299

From the B&N Reads Blog

Customer Reviews