Login / Signup
FGIT-SecTech
2009
2011
2009
2011
Keyphrases
Publications
2011
Sunguk Lee
,
Taeheon Kang
,
Rosslin John Robles
,
Sung-gyu Kim
,
Byungjoo Park
A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks.
FGIT-SecTech
(2011)
F. Eid Heba
,
Mostafa A. Salama
,
Aboul Ella Hassanien
,
Tai-Hoon Kim
Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification.
FGIT-SecTech
(2011)
Lamiaa M. El Bakrawy
,
Neveen I. Ghali
,
Aboul Ella Hassanien
,
Tai-Hoon Kim
A Fast and Secure One-Way Hash Function.
FGIT-SecTech
(2011)
David Rebollo-Monedero
,
Javier Parra-Arnau
,
Jordi Forné
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval.
FGIT-SecTech
(2011)
Yuan Tian
,
Biao Song
,
Eui-nam Huh
A Parameterized Privacy-Aware Pub-sub System in Smart Work.
FGIT-SecTech
(2011)
Gulshan Kumar
,
Mritunjay Kumar Rai
,
Gang-soo Lee
An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher.
FGIT-SecTech
(2011)
Rahul Saha
,
G. Geetha
,
Gang-soo Lee
CLAPTCHA- A Novel Captcha.
FGIT-SecTech
(2011)
Panayotis E. Nastou
,
Yannis C. Stamatiou
A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs.
FGIT-SecTech
(2011)
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Yutaka Miyake
Data Anonymity in Multi-Party Service Model.
FGIT-SecTech
(2011)
Dominik Malcik
,
Martin Drahanský
Microscopic Analysis of Chips.
FGIT-SecTech
(2011)
Danilo Valeros Bernardo
,
Doan B. Hoang
Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT.
FGIT-SecTech
(2011)
Yu Chen
,
Vrizlynn L. L. Thing
A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification.
FGIT-SecTech
(2011)
Hae-Jung Kim
,
Eun-Jun Yoon
Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol.
FGIT-SecTech
(2011)
Vivy Suhendra
A Survey on Access Control Deployment.
FGIT-SecTech
(2011)
Yindong Chen
A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic Immunity.
FGIT-SecTech
(2011)
Bo Zhang
An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model.
FGIT-SecTech
(2011)
Yi-Ming Chen
,
Cheng-En Chuang
,
Hsu-Che Liu
,
Cheng-Yi Ni
,
Chun-Tang Wang
Using Agent in Virtual Machine for Interactive Security Training.
FGIT-SecTech
(2011)
Ruo Ando
,
Kuniyasu Suzaki
A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation.
FGIT-SecTech
(2011)
Pranab Kumar Dhar
,
Mohammad Ibrahim Khan
,
Sunil Dhar
,
Jong-Myon Kim
Robust Audio Watermarking Scheme Based on Short Time Fourier Transformation and Singular Value Decomposition.
FGIT-SecTech
(2011)
Abdelouahed Gherbi
,
Robert Charpentier
Diversity-Based Approaches to Software Systems Security.
FGIT-SecTech
(2011)
Vrizlynn L. L. Thing
,
Wee-Yong Lim
,
Junming Zeng
,
Darell J. J. Tan
,
Yu Chen
Design of a Modular Framework for Noisy Logo Classification in Fraud Detection.
FGIT-SecTech
(2011)
Guo-Hui Zhou
An Effective Distance-Computing Method for Network Anomaly Detection.
FGIT-SecTech
(2011)
Theodosios Tsiakis
,
Aristeidis Chatzipoulidis
,
Theodoros Kargidis
,
Athanasios Belidis
Information Technology Security Governance Approach Comparison in E-banking.
FGIT-SecTech
(2011)
Ju-Sung Kang
,
Dowon Hong
On Fast Private Scalar Product Protocols.
FGIT-SecTech
(2011)
volume 259, 2011
Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings
FGIT-SecTech
259 (2011)
2009
Jieren Cheng
,
Jianping Yin
,
Yun Liu
,
Zhiping Cai
,
Chengkun Wu
Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.
FGIT-SecTech
(2009)
Filip Orság
Speaker Dependent Frequency Cepstrum Coefficients.
FGIT-SecTech
(2009)
Seokung Yoon
,
Hyuncheol Jung
,
Kyung-Seok Lee
A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network.
FGIT-SecTech
(2009)
Mohammad Rakibul Islam
,
Jinsang Kim
MIMO Wiretap Channel: A Scalar Approach.
FGIT-SecTech
(2009)
Linda Ariani Gunawan
,
Peter Herrmann
,
Frank Alexander Kraemer
Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models.
FGIT-SecTech
(2009)
Jaeseung Hong
,
Jongwung Kim
,
Jeonghun Cho
The Trend of the Security Research for the Insider Cyber Threat.
FGIT-SecTech
(2009)
Marek R. Ogiela
,
Urszula Ogiela
Shadow Generation Protocol in Linguistic Threshold Schemes.
FGIT-SecTech
(2009)
Peter Pecho
,
Jan Nagy
,
Petr Hanácek
,
Martin Drahanský
Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.
FGIT-SecTech
(2009)
Qiang Yan
,
Yingjiu Li
,
Tieyan Li
,
Robert H. Deng
Insights into Malware Detection and Prevention on Mobile Phones.
FGIT-SecTech
(2009)
Debnath Bhattacharyya
,
Poulami Das
,
Samir Kumar Bandyopadhyay
,
Tai-Hoon Kim
Grayscale Image Classification Using Supervised Chromosome Clustering.
FGIT-SecTech
(2009)
Mohammad Tabatabai Irani
,
Edgar R. Weippl
Automation of Post-exploitation - (Focused on MS-Windows Targets).
FGIT-SecTech
(2009)
Pairat Thorncharoensri
,
Qiong Huang
,
Willy Susilo
,
Man Ho Au
,
Yi Mu
,
Duncan S. Wong
Escrowed Deniable Identification Schemes.
FGIT-SecTech
(2009)
Ji-Jian Chin
,
Swee-Huay Heng
,
Bok-Min Goi
Hierarchical Identity-Based Identification Schemes.
FGIT-SecTech
(2009)
Gaoshou Zhai
,
Hanhui Niu
,
Na Yang
,
Minli Tian
,
Chengyu Liu
,
Hengsheng Yang
Security Testing for Operating System and Its System Calls.
FGIT-SecTech
(2009)
Abdulaziz S. Almazyad
,
Yasir Ahmad
A New Approach in T-FA Authentication with OTP Using Mobile Phone.
FGIT-SecTech
(2009)
Aneel Rahim
,
Fahad bin Muyaha
Impact of Malicious Node on Broadcast Schemes.
FGIT-SecTech
(2009)
Haimin Jin
,
Duncan S. Wong
,
Yinlong Xu
Efficient Group Signature with Forward Secure Revocation.
FGIT-SecTech
(2009)
Debnath Bhattacharyya
,
Poulami Das
,
Samir Kumar Bandyopadhyay
,
Tai-Hoon Kim
Analysis of Handwritten Signature Image.
FGIT-SecTech
(2009)
Jieren Cheng
,
Boyun Zhang
,
Jianping Yin
,
Yun Liu
,
Zhiping Cai
DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.
FGIT-SecTech
(2009)
Yuan Tian
,
Biao Song
,
Eui-nam Huh
A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments.
FGIT-SecTech
(2009)
Jae-goo Jeong
,
Seung-yong Hur
,
Gang-Soo Lee
A Development of Finite State Machine Create Tool for Cryptography Module Validation.
FGIT-SecTech
(2009)
Dakshina Ranjan Kisku
,
Phalguni Gupta
,
Jamuna Kanta Sing
Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature.
FGIT-SecTech
(2009)
Seyed Hossein Ahmadinejad
,
Saeed Jalili
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.
FGIT-SecTech
(2009)
Rosslin John Robles
,
Min-Kyu Choi
Symmetric-Key Encryption for Wireless Internet SCADA.
FGIT-SecTech
(2009)
volume 58, 2009
Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
FGIT-SecTech
58 (2009)