TEST - Catálogo BURRF
   

Advances in Security Technology : International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers / edited by Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Communications in Computer and Information Science ; 29Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009Descripción: recurso en líneaTipo de contenido:
  • texto
Tipo de medio:
  • computadora
Tipo de portador:
  • recurso en línea
ISBN:
  • 9783642102400
Formatos físicos adicionales: Edición impresa:: Sin títuloClasificación LoC:
  • QA76.9.A25
Recursos en línea:
Contenidos:
Security Analysis of “A Novel Elliptic Curve Dynamic Access Control System” -- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions -- Feature Extraction for IRIS Recognition -- Bidirectional Quantum Secure Direct Communication Based on Entanglement -- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux -- Research on Streaming Data Integration System about Security Threat Monitor -- Using Honeypots to Secure E-Government Networks -- Trust-Risk-Game Based Access Control in Cross Domain Application -- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis -- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment -- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework -- A Secured Technique for Image Data Hiding.
Resumen: This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008. The book includes the special sessions on advanced security technologies towards convergence and green IT (AST-CGIT 2008), on biometrics: security and privacy (BSP 2008), on security education (ASSSE 2008), on security engineering environment (SEE 2008), wireless networks (WN 2008).
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Springer eBooks

Security Analysis of “A Novel Elliptic Curve Dynamic Access Control System” -- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions -- Feature Extraction for IRIS Recognition -- Bidirectional Quantum Secure Direct Communication Based on Entanglement -- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux -- Research on Streaming Data Integration System about Security Threat Monitor -- Using Honeypots to Secure E-Government Networks -- Trust-Risk-Game Based Access Control in Cross Domain Application -- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis -- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment -- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework -- A Secured Technique for Image Data Hiding.

This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008. The book includes the special sessions on advanced security technologies towards convergence and green IT (AST-CGIT 2008), on biometrics: security and privacy (BSP 2008), on security education (ASSSE 2008), on security engineering environment (SEE 2008), wireless networks (WN 2008).

Para consulta fuera de la UANL se requiere clave de acceso remoto.

Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha