default search action
ISA 2010: Miyazaki, Japan
- Samir Kumar Bandyopadhyay, Wael Adi, Tai-Hoon Kim, Yang Xiao:
Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 76, Springer 2010, ISBN 978-3-642-13364-0 - Phalguni Gupta, Dakshina Ranjan Kisku, Jamuna Kanta Sing, Massimo Tistarelli:
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition. 1-8 - Tien-Ho Chen, Han-Cheng Hsiang, Wei-Kuan Shih:
Security Improvement on a Remote User Authentication Scheme Using Smart Cards. 9-16 - Kamaruddin Malik Mohamad, Tutut Herawan, Mustafa Mat Deris:
Dual-Byte-Marker Algorithm for Detecting JFIF Header. 17-26 - Kamaruddin Malik Mohamad, Tutut Herawan, Mustafa Mat Deris:
Hiding Data in JPEG Using in-DQT Technique. 27-36 - Md. Amiruzzaman, Mohammad Abdullah-Al-Wadud, Yoojin Chung:
An Analysis of Syndrome Coding. 37-50 - Gustavo A. Isaza, Andrés G. Castillo, Marcelo López, Luis Fernando Castillo, Manuel López:
Intrusion Correlation Using Ontologies and Multi-agent Systems. 51-63 - Kijeong Lee, Byungjoo Park, Gil-Cheol Park:
Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN. 64-71 - Nadia El Mrabet:
Fault Attacks against the Miller's Algorithm in Edwards Coordinates. 72-85 - Debasis Giri, Prithayan Barua, P. D. Srivastava, Biswapati Jana:
A Cryptosystem for Encryption and Decryption of Long Confidential Messages. 86-96 - Debnath Bhattacharyya, Arijit Chakraborty, Feruza Sattarova Yusufovna, Young-Hun Lee, Tai-Hoon Kim:
Lane Design for Speed Optimization. 97-107 - Debnath Bhattacharyya, A. Shrotri, S. C. Rethrekar, M. H. Patil, Farkhod A. Alisherov, Tai-Hoon Kim:
Biometric Authentication Using Infrared Imaging of Hand Vein Patterns. 108-115 - Maricel O. Balitanas, Tai-Hoon Kim:
IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach. 116-127 - Hae Young Lee, Tae Ho Cho, Hyung-Jong Kim:
Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks. 128-137 - Tai-Hoon Kim:
Pattern Recognition Using Artificial Neural Network: A Review. 138-148 - Zhifeng Xiao, Yang Xiao:
PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks. 149-162 - Jari Veijalainen, Alexander Semenov, Jorma Kyppö:
Tracing Potential School Shooters in the Digital Sphere. 163-178 - Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar:
Infrastructure Aided Privacy Preserving-Authentication in VANETs. 179-189 - Mian Muhammad Waseem Iqbal, Firdous Kausar, Muhammad Arif Wahla:
Attacks on Bluetooth Security Architecture and Its Countermeasures. 190-197 - Muhammad Asif Khan, Firdous Kausar, Ashraf Masood:
Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication. 198-208 - Mushtaq Ahmad:
Security Risks of Cloud Computing and Its Emergence as 5th Utility Service. 209-219 - Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya:
Performance Evaluation of Video Streaming in Vehicular Adhoc Network. 220-224 - Syed Sherjeel Ahmad Gilani, Muhammad Zubair, Zeeshan Shafi Khan:
Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network. 225-232 - Rehan Shafi, Aneel Rahim, Fahad Bin Muhaya, Shehzad Ashraf, Muhammad Sher:
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks. 233-240 - Syed Noor-ul-Hassan Shirazi, Muhammad Asim, Muhammad Irfan, Nassar Ikram:
MPLS Unleashed: Remedy Using IPSEC over MPLS VPN. 241-248 - Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
A New Holistic Security Approach for Government Critical Systems: Flooding Prevention. 249-264 - Xin Huang, Yang Jiang, Xiong Gao, Rong Fu, Tingting Zhang:
Sensor Aided Authentication. 265-277 - Raymond Wu, Keisuke Seki, Ryusuke Sakamoto, Masayuki Hisada:
Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection. 278-285 - Mohammad Nauman, Tamleek Ali:
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones. 286-297 - Aftab Ali, Farrukh Aslam Khan:
An Improved EKG-Based Key Agreement Scheme for Body Area Networks. 298-308 - Sang-Jo Youk, Bong Keun Lee:
Multi-agent Reinforcement Learning Model for Effective Action Selection. 309-317
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.