Advances in Intelligent Systems and Applications - Volume 2

Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012


ISBN: 978-3-642-35472-4 (Print) 978-3-642-35473-1 (Online)

Table of contents (78 chapters)

previous Page of 4
  1. Front Matter

    Pages 1-21

  2. Chapter

    Pages 1-13

    A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols

  3. Chapter

    Pages 15-23

    A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols

  4. Chapter

    Pages 25-32

    An Extension of Harn-Lin’s Cheater Detection and Identification

  5. Chapter

    Pages 33-39

    Cryptanalysis on the User Authentication Scheme with Anonymity

  6. Chapter

    Pages 41-51

    Deniable Authentication Protocols with Confidentiality and Anonymous Fair Protections

  7. Chapter

    Pages 53-60

    A Novel Authentication Scheme Based on Torus Automorphism for Smart Card

  8. Chapter

    Pages 61-68

    Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme

  9. Chapter

    Pages 69-78

    Impact of Identifier-Locator Split Mechanism on DDoS Attacks

  10. Chapter

    Pages 79-89

    Detecting Web-Based Botnets with Fast-Flux Domains

  11. Chapter

    Pages 91-100

    Improvements of Attack-Defense Trees for Threat Analysis

  12. Chapter

    Pages 101-109

    Design and Implementation of a Linux Kernel Based Intrusion Prevention System in Gigabit Network Using Commodity Hardware

  13. Chapter

    Pages 111-120

    Performance Evaluation on Permission-Based Detection for Android Malware

  14. Chapter

    Pages 121-129

    Image Steganography Using Gradient Adjacent Prediction in Side-Match Vector Quantization

  15. Chapter

    Pages 131-139

    A Data Hiding Scheme Based on Square Formula Fully Exploiting Modification Directions

  16. Chapter

    Pages 141-148

    Digital Watermarking Based on JND Model and QR Code Features

  17. Chapter

    Pages 149-158

    Multi-dimensional and Multi-level Histogram-Shifting-Imitated Reversible Data Hiding Scheme

  18. Chapter

    Pages 159-166

    A Threshold Secret Image Sharing with Essential Shadow Images

  19. Chapter

    Pages 167-176

    Theoretical Analysis and Realistic Implementation of Secure Servers Switching System

  20. Chapter

    Pages 177-184

    Design and Implementation of a Self-growth Security Baseline Database for Automatic Security Auditing

  21. Chapter

    Pages 185-194

    Enhancing Cloud-Based Servers by GPU/CPU Virtualization Management

previous Page of 4