Login / Signup
FGIT-SecTech
2009
2011
2009
2011
Keyphrases
Publications
2011
Sunguk Lee
,
Taeheon Kang
,
Rosslin John Robles
,
Sung-gyu Kim
,
Byungjoo Park
A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks.
FGIT-SecTech
(2011)
F. Eid Heba
,
Mostafa A. Salama
,
Aboul Ella Hassanien
,
Tai-Hoon Kim
Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification.
FGIT-SecTech
(2011)
Lamiaa M. El Bakrawy
,
Neveen I. Ghali
,
Aboul Ella Hassanien
,
Tai-Hoon Kim
A Fast and Secure One-Way Hash Function.
FGIT-SecTech
(2011)
David Rebollo-Monedero
,
Javier Parra-Arnau
,
Jordi Forné
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval.
FGIT-SecTech
(2011)
Yuan Tian
,
Biao Song
,
Eui-nam Huh
A Parameterized Privacy-Aware Pub-sub System in Smart Work.
FGIT-SecTech
(2011)
Gulshan Kumar
,
Mritunjay Kumar Rai
,
Gang-soo Lee
An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher.
FGIT-SecTech
(2011)
Rahul Saha
,
G. Geetha
,
Gang-soo Lee
CLAPTCHA- A Novel Captcha.
FGIT-SecTech
(2011)
Panayotis E. Nastou
,
Yannis C. Stamatiou
A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs.
FGIT-SecTech
(2011)
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Yutaka Miyake
Data Anonymity in Multi-Party Service Model.
FGIT-SecTech
(2011)
Dominik Malcik
,
Martin Drahanský
Microscopic Analysis of Chips.
FGIT-SecTech
(2011)
Danilo Valeros Bernardo
,
Doan B. Hoang
Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT.
FGIT-SecTech
(2011)
Yu Chen
,
Vrizlynn L. L. Thing
A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification.
FGIT-SecTech
(2011)
Hae-Jung Kim
,
Eun-Jun Yoon
Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol.
FGIT-SecTech
(2011)
Vivy Suhendra
A Survey on Access Control Deployment.
FGIT-SecTech
(2011)
Yindong Chen
A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic Immunity.
FGIT-SecTech
(2011)
Bo Zhang
An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model.
FGIT-SecTech
(2011)
Yi-Ming Chen
,
Cheng-En Chuang
,
Hsu-Che Liu
,
Cheng-Yi Ni
,
Chun-Tang Wang
Using Agent in Virtual Machine for Interactive Security Training.
FGIT-SecTech
(2011)
Ruo Ando
,
Kuniyasu Suzaki
A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation.
FGIT-SecTech
(2011)
Pranab Kumar Dhar
,
Mohammad Ibrahim Khan
,
Sunil Dhar
,
Jong-Myon Kim
Robust Audio Watermarking Scheme Based on Short Time Fourier Transformation and Singular Value Decomposition.
FGIT-SecTech
(2011)
Abdelouahed Gherbi
,
Robert Charpentier
Diversity-Based Approaches to Software Systems Security.
FGIT-SecTech
(2011)
Vrizlynn L. L. Thing
,
Wee-Yong Lim
,
Junming Zeng
,
Darell J. J. Tan
,
Yu Chen
Design of a Modular Framework for Noisy Logo Classification in Fraud Detection.
FGIT-SecTech
(2011)
Guo-Hui Zhou
An Effective Distance-Computing Method for Network Anomaly Detection.
FGIT-SecTech
(2011)
Theodosios Tsiakis
,
Aristeidis Chatzipoulidis
,
Theodoros Kargidis
,
Athanasios Belidis
Information Technology Security Governance Approach Comparison in E-banking.
FGIT-SecTech
(2011)
Ju-Sung Kang
,
Dowon Hong
On Fast Private Scalar Product Protocols.
FGIT-SecTech
(2011)
volume 259, 2011
Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings
FGIT-SecTech
259 (2011)