Global Security, Safety and Sustainability & e-Democracy

7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers

ISBN: 978-3-642-33447-4 (Print) 978-3-642-33448-1 (Online)

Table of contents (37 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-8

    Transforming Vehicles into e-government ’Cloud Computing’ Nodes

  3. No Access

    Book Chapter

    Pages 9-16

    Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining

  4. No Access

    Book Chapter

    Pages 17-22

    Practical Password Harvesting from Volatile Memory

  5. No Access

    Book Chapter

    Pages 23-30

    Applied Phon Curve Algorithm for Improved Voice Recognition and Authentication

  6. No Access

    Book Chapter

    Pages 31-37

    Tuning the Epidemical Algorithm in Wireless Sensor Networks

  7. No Access

    Book Chapter

    Pages 38-45

    A Robustness Testing Method for Network Security

  8. No Access

    Book Chapter

    Pages 46-53

    Economic Evaluation of Interactive Audio Media for Securing Internet Services

  9. No Access

    Book Chapter

    Pages 54-61

    On the Evolution of Malware Species

  10. No Access

    Book Chapter

    Pages 62-66

    PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security

  11. No Access

    Book Chapter

    Pages 67-71

    GSi Compliant RAS for Public Private Sector Partnership

  12. No Access

    Book Chapter

    Pages 72-79

    A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution

  13. No Access

    Book Chapter

    Pages 80-87

    Cryptographic Dysfunctionality-A Survey on User Perceptions of Digital Certificates

  14. No Access

    Book Chapter

    Pages 88-95

    Towards Colored Petri Net Modeling of Expanded C-TMAC

  15. No Access

    Book Chapter

    Pages 96-103

    Leveraging the e-passport PKI to Achieve Interoperable Security for e-government Cross Border Services

  16. No Access

    Book Chapter

    Pages 104-111

    Genre-Based Information Hiding

  17. No Access

    Book Chapter

    Pages 112-119

    In the Hacker’s Eye: The Neurophysiology of a Computer Hacker

  18. No Access

    Book Chapter

    Pages 120-125

    Untangling Public Service Usage for Agribusinesses with Dialogic E-government

  19. No Access

    Book Chapter

    Pages 126-130

    On the Deployment of Artificial Immune Systems for Biometrics

  20. No Access

    Book Chapter

    Pages 131-138

    A Prediction Model for Criminal Levels Specialized in Brazilian Cities

  21. No Access

    Book Chapter

    Pages 139-147

    MASSIF: A Promising Solution to Enhance Olympic Games IT Security

previous Page of 2