Computer Applications for Security, Control and System Engineering

International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings

ISBN: 978-3-642-35263-8 (Print) 978-3-642-35264-5 (Online)

Table of contents (64 chapters)

previous Page of 4
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-6

    Novel Compositing Method for Quantification of Wireless Network Security

  3. No Access

    Book Chapter

    Pages 7-13

    Obfuscation Method for Location Trajectory

  4. No Access

    Book Chapter

    Pages 14-21

    Performance of Physical Unclonable Functions with Shift-Register-Based Post-processing

  5. No Access

    Book Chapter

    Pages 22-29

    A Pseudo State-Based Distributed DoS Detection Mechanism Using Dynamic Hashing

  6. No Access

    Book Chapter

    Pages 30-37

    An Engineering Environment for Supporting Information Security Management Systems

  7. No Access

    Book Chapter

    Pages 38-45

    Multiple Watermark Generation Using Dot Code A and Hadamard Transform for Audio Content

  8. No Access

    Book Chapter

    Pages 46-53

    Modeling of a Copyright Protection System for the BitTorrent Environment

  9. No Access

    Book Chapter

    Pages 54-61

    Security Enhancements of an Improved Timestamp-Based Remote User Authentication Scheme

  10. No Access

    Book Chapter

    Pages 62-69

    Symbian Smartphone Forensics: Linear Bitwise Data Acquisition and Fragmentation Analysis

  11. No Access

    Book Chapter

    Pages 70-77

    Enhanced Hash-Based RFID Mutual Authentication Protocol

  12. No Access

    Book Chapter

    Pages 78-85

    Modeling Multiple Modes of Operation with Alloy

  13. No Access

    Book Chapter

    Pages 86-93

    Non-interactive Hierarchical Key Agreement Protocol over Hierarchical Wireless Sensor Networks

  14. No Access

    Book Chapter

    Pages 94-100

    Design and Implementation of IVEF Protocol Using Wireless Communication on Android Mobile Platform

  15. No Access

    Book Chapter

    Pages 101-108

    Security Issues and Threats According to the Attribute of Cloud Computing

  16. No Access

    Book Chapter

    Pages 109-114

    Development of Computer, Math, Art Convergence Education Lesson Plans Based on Smart Grid Technology

  17. No Access

    Book Chapter

    Pages 115-121

    The Effect of STEAM Education on Elementary School Student’s Creativity Improvement

  18. No Access

    Book Chapter

    Pages 122-127

    Security Improvement on a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment

  19. No Access

    Book Chapter

    Pages 128-132

    An Analysis of Effects and Benefits of STS Model Based on Universal Design for Learning

  20. No Access

    Book Chapter

    Pages 133-138

    Program Development of Science and Culture Education Tapping into Jeju’s Special Characteristics for Adults

  21. No Access

    Book Chapter

    Pages 139-143

    A Study on the Learner Participation Interaction for Multi-modality Integration for Smart Devices

previous Page of 4