Information Security and Assurance

4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings

  • Samir Kumar Bandyopadhyay
  • Wael Adi
  • Tai-hoon Kim
  • Yang Xiao
Conference proceedings ISA 2010

Part of the Communications in Computer and Information Science book series (CCIS, volume 76)

Table of contents

  1. Front Matter
  2. Phalguni Gupta, Dakshina Ranjan Kisku, Jamuna Kanta Sing, Massimo Tistarelli
    Pages 1-8
  3. Tien-Ho Chen, Han-Cheng Hsiang, Wei-Kuan Shih
    Pages 9-16
  4. Kamaruddin Malik Mohamad, Tutut Herawan, Mustafa Mat Deris
    Pages 17-26
  5. Kamaruddin Malik Mohamad, Tutut Herawan, Mustafa Mat Deris
    Pages 27-36
  6. Md Amiruzzaman, M. Abdullah-Al-Wadud, Yoojin Chung
    Pages 37-50
  7. Gustavo Isaza, Andrés Castillo, Marcelo López, Luis Castillo, Manuel López
    Pages 51-63
  8. Debasis Giri, Prithayan Barua, P. D. Srivastava, Biswapati Jana
    Pages 86-96
  9. Debnath Bhattacharyya, Arijit Chakraborty, Feruza Sattarova, Young-hun Lee, Tai-hoon Kim
    Pages 97-107
  10. Debnath Bhattacharyya, A. Shrotri, S. C. Rethrekar, M. H. Patil, Farkhod A. Alisherov, Tai-hoon Kim
    Pages 108-115
  11. Maricel Balitanas, Tai-hoon Kim
    Pages 116-127
  12. Hae Young Lee, Tae Ho Cho, Hyung-Jong Kim
    Pages 128-137
  13. Jari Veijalainen, Alexander Semenov, Jorma Kyppö
    Pages 163-178
  14. Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar
    Pages 179-189
  15. Mian Muhammad Waseem Iqbal, Firdous Kausar, Muhammad Arif Wahla
    Pages 190-197
  16. Muhammad Asif Khan, Firdous Kausar, Ashraf Masood
    Pages 198-208

About these proceedings


Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Advanced Science and Technology), ACN 2010 (The second International Conference on Advanced Communication and Networking), ISA 2010 (The 4th International Conference on Information Security and Assurance) and UCMA 2010 (The 2010 International Conference on Ubiquitous Computing and Multimedia Applications). We would like to express our gratitude to all of the authors of submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. We acknowledge the great effort of all the Chairs and the members of advisory boards and Program Committees of the above-listed events, who selected 15% of over 1,000 submissions, following a rigorous peer-review process. Special thanks go to SERSC (Science & Engineering Research Support soCiety) for supporting these - located conferences.


accountability advance encryption standard authentication cloud computing correlation modeling simulation

Editors and affiliations

  • Samir Kumar Bandyopadhyay
    • 1
  • Wael Adi
    • 2
  • Tai-hoon Kim
    • 3
  • Yang Xiao
    • 4
  1. 1.University of CalcuttaIndia
  2. 2.Braunschweig University of TechnologyBraunschweigGermany
  3. 3.Hannam UniversityDaejeonSouth Korea
  4. 4.The University of AlabamaTuscaloosaUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-13364-0
  • Online ISBN 978-3-642-13365-7
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • About this book