↓ Skip to main content

Security Technology

Overview of attention for book
Cover of 'Security Technology'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Applications of Reversible Data Hiding Techniques with the Quick Response Codes
  3. Altmetric Badge
    Chapter 2 A New Approach in T-FA Authentication with OTP Using Mobile Phone
  4. Altmetric Badge
    Chapter 3 Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows
  5. Altmetric Badge
    Chapter 4 A Study on Secure Contents Using in Urban Computing
  6. Altmetric Badge
    Chapter 5 Shadow Generation Protocol in Linguistic Threshold Schemes
  7. Altmetric Badge
    Chapter 6 Analysis of Handwritten Signature Image
  8. Altmetric Badge
    Chapter 7 The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device
  9. Altmetric Badge
    Chapter 8 Hardware Based Data Inspection for USB Data Leakage Prevention
  10. Altmetric Badge
    Chapter 9 Grayscale Image Classification Using Supervised Chromosome Clustering
  11. Altmetric Badge
    Chapter 10 Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models
  12. Altmetric Badge
    Chapter 11 Impact of Malicious Node on Broadcast Schemes
  13. Altmetric Badge
    Chapter 12 Hierarchical Identity-Based Identification Schemes
  14. Altmetric Badge
    Chapter 13 The Trend of the Security Research for the Insider Cyber Threat
  15. Altmetric Badge
    Chapter 14 MIMO Wiretap Channel: A Scalar Approach
  16. Altmetric Badge
    Chapter 15 Security Testing for Operating System and Its System Calls
  17. Altmetric Badge
    Chapter 16 Efficient Group Signature with Forward Secure Revocation
  18. Altmetric Badge
    Chapter 17 Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion
  19. Altmetric Badge
    Chapter 18 Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code
  20. Altmetric Badge
    Chapter 19 Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code
  21. Altmetric Badge
    Chapter 20 Feature Level Fusion of Biometrics Cues: Human Identification with Doddington’s Caricature
  22. Altmetric Badge
    Chapter 21 A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network
  23. Altmetric Badge
    Chapter 22 DDoS Attack Detection Using Three-State Partition Based on Flow Interaction
  24. Altmetric Badge
    Chapter 23 A Development of Finite State Machine Create Tool for Cryptography Module Validation
  25. Altmetric Badge
    Chapter 24 A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments
  26. Altmetric Badge
    Chapter 25 Fusion of Multiple Matchers Using SVM for Offline Signature Identification
  27. Altmetric Badge
    Chapter 26 A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card
  28. Altmetric Badge
    Chapter 27 Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors
  29. Altmetric Badge
    Chapter 28 Accelerometer Based Digital Video Stabilization for Security Surveillance Systems
  30. Altmetric Badge
    Chapter 29 Escrowed Deniable Identification Schemes
  31. Altmetric Badge
    Chapter 30 Insights into Malware Detection and Prevention on Mobile Phones
  32. Altmetric Badge
    Chapter 31 Automation of Post-exploitation
  33. Altmetric Badge
    Chapter 32 Speaker Dependent Frequency Cepstrum Coefficients
  34. Altmetric Badge
    Chapter 33 Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection
  35. Altmetric Badge
    Chapter 34 A Simple Encryption Scheme for Binary Elliptic Curves
  36. Altmetric Badge
    Chapter 35 Analysis of Text Complexity in a Crypto System – A Case Study on Telugu
  37. Altmetric Badge
    Chapter 36 Symmetric-Key Encryption for Wireless Internet SCADA
  38. Altmetric Badge
    Chapter 37 An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user
facebook
1 Facebook page

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
6 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security Technology
Published by
Springer Berlin Heidelberg, November 2009
DOI 10.1007/978-3-642-10847-1
ISBNs
978-3-64-210846-4, 978-3-64-210847-1
Editors

Ślęzak, Dominik, Kim, Tai-hoon, Fang, Wai-Chi, Arnett, Kirk P.

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 6 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 1 17%
Brazil 1 17%
Unknown 4 67%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 33%
Professor 1 17%
Student > Master 1 17%
Unknown 2 33%
Readers by discipline Count As %
Computer Science 4 67%
Unknown 2 33%