Advertisement

Advances in Information Security and Assurance

Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

  • Jong Hyuk Park
  • Hsiao-Hwa Chen
  • Mohammed Atiquzzaman
  • Changhoon Lee
  • Tai-hoon Kim
  • Sang-Soo Yeo
Conference proceedings ISA 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5576)

Table of contents

  1. Front Matter
  2. Cryptographic Algorithms

    1. Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park et al.
      Pages 1-10
    2. Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park
      Pages 11-20
  3. Authentication and Identity Management

    1. Franck Cassez
      Pages 21-30
    2. Yumin Yuan, Da Li, Liwen Tian, Haishan Zhu
      Pages 31-40
  4. Authorization and Access Control

    1. Amril Syalim, Yoshiaki Hori, Kouichi Sakurai
      Pages 51-59
    2. Chao Huang, Jianling Sun, Xinyu Wang, Yuanjie Si
      Pages 70-79
    3. Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai
      Pages 80-89
  5. Biometrics and Computer Forensics

    1. Rahib Abiyev, Kemal Kilic
      Pages 90-99
    2. Hamidreza Rashidy Kanan, M. Shahram Moin
      Pages 100-109
    3. Magdalena Szeżyńska, Ewa Huebner, Derek Bem, Chun Ruan
      Pages 110-121
  6. Cryptographic Protocols

    1. Qingfeng Cheng, Chuangui Ma, Xuexian Hu
      Pages 135-144
    2. Chang-An Zhao, Dongqing Xie, Fangguo Zhang, Chong-Zhi Gao, Jingwei Zhang
      Pages 145-151
    3. Zheng Huang, Weidong Qiu, Qiang Li, Kefei Chen
      Pages 152-158
  7. Data Integrity and Privacy

    1. Mohammad-Reza Zare-Mirakabad, Aman Jantan, Stéphane Bressan
      Pages 159-168
    2. Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu
      Pages 169-178
    3. Benedikt Westermann, Andriy Panchenko, Lexi Pimenidis
      Pages 179-189
  8. Key Management and Recovery

    1. Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong
      Pages 200-209
  9. Mobile and RFID Network Security

    1. Matthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben
      Pages 210-222
    2. Abid Khan, Qasim Arshad, Xiamu Niu, Zhang Yong, Muhammad Waqas Anwar
      Pages 223-228
  10. Firewall, IDS, Anti-virus, and Other Security Products

    1. Hongying Tang, Bo Zhu, Kui Ren
      Pages 229-238
    2. Siraj A. Shaikh, Howard Chivers, Philip Nobles, John A. Clark, Hao Chen
      Pages 250-259
  11. Internet and Web Services Security

    1. Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-Ta Chen
      Pages 270-279
  12. Cyber-attack and Cyber-terrorism

    1. Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk-Park
      Pages 280-289
    2. Tae Hwan Kim, Dong Seong Kim, Sang Min Lee, Jong Sou Park
      Pages 290-300
    3. Ming-Yang Su, Kai-Chi Chang, Chun-Yuen Lin
      Pages 301-306
  13. Other Security Research

    1. Yanjun Wu, Tzi-cker Chiueh, Chen Zhao
      Pages 307-316
    2. Hedieh Sajedi, Mansour Jamzad
      Pages 317-326
    3. Zhimin Chen, Syed Haider, Patrick Schaumont
      Pages 327-336
    4. Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng, Tsung-Che Yang, Mei-Chun Chou
      Pages 347-357
    5. Lingli Deng, Yeping He, Ziyao Xu
      Pages 358-367
    6. Jongsung Kim, Raphael C. -W. Phan
      Pages 368-381
  14. MoWiN 2009

    1. Edison Pignaton de Freitas, Tales Heimfarth, Marco Aurélio Wehrmeister, Flávio Rech Wagner, Armando Morado Ferreia, Carlos Eduardo Pereira et al.
      Pages 422-431
    2. Ronald Beaubrun, Badji Molo
      Pages 432-437
    3. Kazuyuki Sakoda, Yuichi Morioka, Chihiro Fujita, Erica Tanimoto, Kenzoh Nishikawa, Mitsuhiro Suzuki
      Pages 438-449
    4. So-Young Kang, Jin-Woo Song, Kwang-Jo Lee, Ju-Hee Lee, Ji-Hoon Kim, Sung-Bong Yang
      Pages 461-470
    5. Kyunghwa Lee, Joohyun Lee, Bongduk Zhang, Jaeho Kim, Yongtae Shin
      Pages 471-484
    6. Takahide Yanaka, Toshihiko Sasama, Hiroshi Masuyama
      Pages 485-493

Other volumes

  1. Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
  2. Advances in Information Security and Assurance
    Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009.

The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009.

Keywords

authentication cryptographic hardware data security e-health fingerprint detection firewall identity management key exchange network security privacy radio-frequency identification (RFID) sensor networks ubiquitous computing ubiquitous environments wireless networks

Editors and affiliations

  • Jong Hyuk Park
    • 1
  • Hsiao-Hwa Chen
    • 2
  • Mohammed Atiquzzaman
    • 3
  • Changhoon Lee
    • 4
  • Tai-hoon Kim
    • 5
  • Sang-Soo Yeo
    • 6
  1. 1.Computer Engineering DepartmentKyungnam UniversityKyungnamKorea
  2. 2.Institute of Communications EngineeringNational Sun Yat-Sen UniversityKaohsiung CityTaiwan
  3. 3.School of Computer Science,University of OklahomaNormanUSA
  4. 4.School of Computer EngineeringHanshin UniversityKyeong-GiKorea
  5. 5.Division of MultimediaHannam UniversityDaejeonKorea
  6. 6.Division of Computer EngineeringMokwon UniversityDaejeonKorea

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-02617-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-02616-4
  • Online ISBN 978-3-642-02617-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site