Proceedings of the International Conference on IT Convergence and Security 2011

  • Kuinam J. Kim
  • Seong Jin Ahn

Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 120)

Table of contents

  1. Front Matter
    Pages i-xiii
  2. Security Fundamentals

    1. Front Matter
      Pages 1-1
    2. Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad
      Pages 21-37
  3. Industrial and Business Information Security

    1. Front Matter
      Pages 39-39
    2. ByungRae Cha, JaeHyun Seo, JongWon Kim
      Pages 41-50
    3. André van Cleeff, Trajce Dimkov, Wolter Pieters, Roel Wieringa
      Pages 51-67
    4. Yi-Chang Hsu, Jing-Jang Hwang
      Pages 69-79
    5. Sun-Moon Jo, Kyung-Yong Chung
      Pages 81-90
    6. Hyung-Jun Seo, Yoon-Cheol Choy
      Pages 111-120
  4. Security Protocols and Applications

    1. Front Matter
      Pages 121-121
    2. Hyochang Ahn, Yong-Hwan Lee, Han-Jin Cho, Sang-Burm Rhee, June-Hwan Lee
      Pages 123-127
    3. M. Arshad Awan, A. Sattar, Cheong Ghil Kim, Chung Pyo Hong, Shin Dug Kim
      Pages 129-143
    4. Inhwan Choi, Dongkun Shin
      Pages 145-149
    5. Byung Ki Kim, Jae Hyeok Jang, Kyung Woo Hur, Jeong Gun Lee, Young Woong Ko
      Pages 151-161
    6. Young-Joon Jang, Dongkun Shin
      Pages 163-168
    7. Jonghun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Lee, Kyung-Yong Chung
      Pages 169-177
    8. Si-Jung Kim, Do-Eun Cho, Bong-Han Kim
      Pages 179-189

About these proceedings

Introduction

As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task.

Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits:

1.      Introduction of the most recent information technology and its related ideas

2.      Applications and problems related to technology convergence, and its case studies

3.      Introduction of converging existing security techniques through convergence security

Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.

Keywords

Convergence Security Convergence data mining Data Mining Green convergence services IT Convergence Information technology convergence Information visualization Mobile Computing Multimedia Security Software Engineering

Editors and affiliations

  • Kuinam J. Kim
    • 1
  • Seong Jin Ahn
    • 2
  1. 1., Convergence SecurityKyoung-gi UniversitySuwon, Gyeonggi-doKorea, Republic of (South Korea)
  2. 2., Computer ScienceSungkyunkwan UniversitySuwon, Gyeonggi-doKorea, Republic of (South Korea)

Bibliographic information

  • DOI https://doi.org/10.1007/978-94-007-2911-7
  • Copyright Information Springer Science+Business Media B.V. 2012
  • Publisher Name Springer, Dordrecht
  • eBook Packages Engineering
  • Print ISBN 978-94-007-2910-0
  • Online ISBN 978-94-007-2911-7
  • Series Print ISSN 1876-1100
  • Series Online ISSN 1876-1119
  • About this book