IT Convergence and Security 2012

Editors:

ISBN: 978-94-007-5859-9 (Print) 978-94-007-5860-5 (Online)

Table of contents (149 chapters)

previous Page of 8
  1. Front Matter

    Pages i-xix

  2. Security Fundamentals

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-11

      Development of an Automatic Document Malware Analysis System

    3. No Access

      Book Chapter

      Pages 13-20

      Study of Behavior-Based High Speed Visit/Inspection Technology to Detect Malicious Websites

    4. No Access

      Book Chapter

      Pages 21-28

      One-Way Hash Function Based on Cellular Automata

    5. No Access

      Book Chapter

      Pages 29-34

      A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory

    6. No Access

      Book Chapter

      Pages 35-41

      Forensic Evidence Collection Procedures of Smartphone in Crime Scene

    7. No Access

      Book Chapter

      Pages 43-50

      NAC System Analysis and Design for Improvement Model

  3. Industrial and Business Information Security

    1. Front Matter

      Pages 51-51

    2. No Access

      Book Chapter

      Pages 53-60

      Analysis of Methods for Detecting Compromised Nodes and its Countermeasures

    3. No Access

      Book Chapter

      Pages 61-69

      Protecting Advertisers Against Click Frauds

    4. No Access

      Book Chapter

      Pages 71-78

      A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS)

    5. No Access

      Book Chapter

      Pages 79-85

      Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment

    6. No Access

      Book Chapter

      Pages 87-92

      A Study About Security Awareness Program Based on RFID Access Control System

    7. No Access

      Book Chapter

      Pages 93-99

      A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method

    8. No Access

      Book Chapter

      Pages 101-110

      An Investigation on the Research Topics in Relation to Information Systems in Supply Chain Management

    9. No Access

      Book Chapter

      Pages 111-118

      Designing a Model for Context Awareness Based Reliable Auction-Recommending System (CARARS) by Utilizing Advanced Information

  4. Security Protocols and Applications

    1. Front Matter

      Pages 119-119

    2. No Access

      Book Chapter

      Pages 121-129

      A Secure Self-Encryption Scheme for Resource Limited Mobile Devices

    3. No Access

      Book Chapter

      Pages 131-140

      A Study on the Network Stability Measurement Based on an Articulation Nodes with Weight Value

    4. No Access

      Book Chapter

      Pages 141-149

      An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks

    5. No Access

      Book Chapter

      Pages 151-157

      An Identity-Based Ring Signcryption Scheme

    6. No Access

      Book Chapter

      Pages 159-167

      A Secure DS-CDMA Technique with Capacity Enhancement for Ad Hoc Wireless Networks

    7. No Access

      Book Chapter

      Pages 169-175

      A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent

previous Page of 8