Coverart for item
The Resource Advances in Information Security and Its Application : Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, edited by James (Jong Hyuk) Park, Justin Zhan, Changhoon Lee, Guilin Wang, Sang-Soo Yeo, (electronic resource)

Advances in Information Security and Its Application : Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, edited by James (Jong Hyuk) Park, Justin Zhan, Changhoon Lee, Guilin Wang, Sang-Soo Yeo, (electronic resource)

Label
Advances in Information Security and Its Application : Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
Title
Advances in Information Security and Its Application
Title remainder
Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
Statement of responsibility
edited by James (Jong Hyuk) Park, Justin Zhan, Changhoon Lee, Guilin Wang, Sang-Soo Yeo
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application; security protocol and its application, other security research
Member of
Is Subseries of
Dewey number
005.8
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • x3UKDQtqrW0
  • I6kpzntDM-0
  • CJ-gFBYoTB0
  • EMVm-72_qC8
  • qA3PwjKdIwo
Language note
English
LC call number
TK5105.5-5105.9
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2009
http://bibfra.me/vocab/lite/meetingName
International Conference on Information Security and Assurance
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Park, James (Jong Hyuk).
  • Zhan, Justin.
  • Lee, Changhoon.
  • Wang, Guilin.
  • Yeo, Sang-Soo.
Series statement
Communications in Computer and Information Science,
Series volume
36
http://library.link/vocab/subjectName
  • Computer Communication Networks
  • Computer security
  • Computer network architectures
  • Data structures (Computer scienc
  • Data encryption (Computer science)
  • Computer system performance
  • Computer Communication Networks
  • Systems and Data Security
  • Computer Systems Organization and Communication Networks
  • Data Structures and Information Theory
  • Cryptology
  • System Performance and Evaluation
Label
Advances in Information Security and Its Application : Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, edited by James (Jong Hyuk) Park, Justin Zhan, Changhoon Lee, Guilin Wang, Sang-Soo Yeo, (electronic resource)
Instantiates
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
Information Assurance and Its Application -- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections -- A Security Metrics Development Method for Software Intensive Systems -- The ISDF Framework: Integrating Security Patterns and Best Practices -- Security Protocol and Its Application -- Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server -- Concurrency and Time in Role-Based Access Control -- Performance Assessment Method for a Forged Fingerprint Detection Algorithm -- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings -- A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes -- Context-Based E-Health System Access Control Mechanism -- Analysis of a Mathematical Model for Worm Virus Propagation -- Other Security Research -- A Contents Encryption Mechanism Using Reused Key in IPTV -- High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform -- Experiment Research of Automatic Deception Model Based on Autonomic Computing -- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks -- Reconsidering Data Logging in Light of Digital Forensics -- Blurriness in Live Forensics: An Introduction
Dimensions
unknown
Edition
1st ed. 2009.
Extent
1 online resource (136 p.)
Form of item
online
Isbn
9783642026331
Media category
computer
Media type code
c
Other control number
10.1007/978-3-642-02633-1
Specific material designation
remote
System control number
  • (CKB)1000000000761303
  • (EBL)450918
  • (OCoLC)432712670
  • (SSID)ssj0000098812
  • (PQKBManifestationID)11127775
  • (PQKBTitleCode)TC0000098812
  • (PQKBWorkID)10132948
  • (PQKB)10717954
  • (DE-He213)978-3-642-02633-1
  • (MiAaPQ)EBC450918
  • (EXLCZ)991000000000761303
Label
Advances in Information Security and Its Application : Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, edited by James (Jong Hyuk) Park, Justin Zhan, Changhoon Lee, Guilin Wang, Sang-Soo Yeo, (electronic resource)
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
Information Assurance and Its Application -- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections -- A Security Metrics Development Method for Software Intensive Systems -- The ISDF Framework: Integrating Security Patterns and Best Practices -- Security Protocol and Its Application -- Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server -- Concurrency and Time in Role-Based Access Control -- Performance Assessment Method for a Forged Fingerprint Detection Algorithm -- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings -- A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes -- Context-Based E-Health System Access Control Mechanism -- Analysis of a Mathematical Model for Worm Virus Propagation -- Other Security Research -- A Contents Encryption Mechanism Using Reused Key in IPTV -- High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform -- Experiment Research of Automatic Deception Model Based on Autonomic Computing -- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks -- Reconsidering Data Logging in Light of Digital Forensics -- Blurriness in Live Forensics: An Introduction
Dimensions
unknown
Edition
1st ed. 2009.
Extent
1 online resource (136 p.)
Form of item
online
Isbn
9783642026331
Media category
computer
Media type code
c
Other control number
10.1007/978-3-642-02633-1
Specific material designation
remote
System control number
  • (CKB)1000000000761303
  • (EBL)450918
  • (OCoLC)432712670
  • (SSID)ssj0000098812
  • (PQKBManifestationID)11127775
  • (PQKBTitleCode)TC0000098812
  • (PQKBWorkID)10132948
  • (PQKB)10717954
  • (DE-He213)978-3-642-02633-1
  • (MiAaPQ)EBC450918
  • (EXLCZ)991000000000761303

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...