Advances In Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, Dece by Akingbehin KiumiAdvances In Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, Dece by Akingbehin Kiumi

Advances In Security Technology: International Conference, SecTech 2008, and Its Special Sessions…

byAkingbehin Kiumi

Paperback | November 2, 2009

Pricing and Purchase Info

$85.84 online 
$164.50 list price save 47%
Earn 429 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008.The book includes the special sessions on advanced security technologies towards convergence and green IT (AST-CGIT 2008), on biometrics: security and privacy (BSP 2008), on security education (ASSSE 2008), on security engineering environment (SEE 2008), wireless networks (WN 2008).
Title:Advances In Security Technology: International Conference, SecTech 2008, and Its Special Sessions…Format:PaperbackDimensions:161 pages, 23.5 × 15.5 × 0.02 inPublished:November 2, 2009Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3642102395

ISBN - 13:9783642102394

Reviews

Table of Contents

Security Analysis of "A Novel Elliptic Curve Dynamic Access Control System".- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions.- Feature Extraction for IRIS Recognition.- Bidirectional Quantum Secure Direct Communication Based on Entanglement.- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux.- Research on Streaming Data Integration System about Security Threat Monitor.- Using Honeypots to Secure E-Government Networks.- Trust-Risk-Game Based Access Control in Cross Domain Application.- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis.- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment.- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework.- A Secured Technique for Image Data Hiding.