Information Security and Digital Forensics

First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers

Editors:

ISBN: 978-3-642-11529-5 (Print) 978-3-642-11530-1 (Online)

Table of contents (19 chapters)

  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-10

    Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks

  3. No Access

    Book Chapter

    Pages 11-18

    A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation

  4. No Access

    Book Chapter

    Pages 19-25

    On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise

  5. No Access

    Book Chapter

    Pages 26-41

    Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment

  6. No Access

    Book Chapter

    Pages 42-49

    Face Recognition Using Balanced Pairwise Classifier Training

  7. No Access

    Book Chapter

    Pages 50-56

    Forensic Investigation of the Soft-Modded PlayStation Portable (PSP)

  8. No Access

    Book Chapter

    Pages 57-65

    Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems

  9. No Access

    Book Chapter

    Pages 66-75

    Parameter Based Access Control Model for Mobile Handsets

  10. No Access

    Book Chapter

    Pages 76-81

    Ethical Dilemmas in Teaching Computer and Internet Security

  11. No Access

    Book Chapter

    Pages 82-91

    Overview of SIP Attacks and Countermeasures

  12. No Access

    Book Chapter

    Pages 92-101

    Security Challenges in Multihop Wireless Mesh Networks–A Survey

  13. No Access

    Book Chapter

    Pages 102-110

    A Security Architecture to Protect Against Data Loss

  14. No Access

    Book Chapter

    Pages 111-122

    A Simple Method for Improving Intrusion Detections in Corporate Networks

  15. No Access

    Book Chapter

    Pages 123-134

    Detecting Sybils in Peer-to-Peer File Replication Systems

  16. No Access

    Book Chapter

    Pages 135-146

    Adaptive Clustering Method for Reclassifying Network Intrusions

  17. No Access

    Book Chapter

    Pages 147-154

    Technology Perspective: Is Green IT a Threat to IT Security?

  18. No Access

    Book Chapter

    Pages 155-162

    An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics

  19. No Access

    Book Chapter

    Pages 163-171

    Cross-Enterprise Policy Model for e-Business Web Services Security

  20. No Access

    Book Chapter

    Pages 172-183

    Challenges of Identity Management – A Context in Rural India

  21. Back Matter

    Pages -