Login

Jahankhani, Hamid

Global E-Security

Jahankhani, Hamid - Global E-Security, ebook

71,90€

Ebook, PDF with Adobe DRM
ISBN: 9783540694038
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Global E-Security
Hamid Jahankhani, Ameer Al-Nemrat

2. How to Find Exculpatory and Inculpatory Evidence Using a Circular Digital Forensics Process Model
Marjan Khatir, Seyed Mahmood Hejazi

3. Identity Theft: A Study in Contact Centres
Iain Moir, George R. S. Weir

4. A Reasoning Agent for Credit Card Fraud on the Internet Using the Event Calculus
Clive Blackwell

5. Trends in Smartcard Fraud
Susan Burns, George R. S. Weir

6. Tracking Online Trails
Man Qi, Denis Edgar-Nevill, Yongquan Wang, Rongsheng Xu

7. Evaluation of Tools for Protection of Interest against Hacking and Cracking
Hossein Jahankhani, Branko Antonijevic, Terry Walcott

8. Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks
Jan Seedorf, Kristian Beckers, Felipe Huici

9. Covert Channels in SIP for VoIP Signalling
Wojciech Mazurczyk, Krzysztof Szczypiorski

10. Secure Recognition of Voice-Less Commands Using Videos
Wai Chee Yau, Dinesh Kant Kumar, Hans Weghorn

11. An Extended Secret Sharing Scheme for Color Images with Fixed Pixel Expansion
Rabia Sirhindi, Mehreen Afzal, Saeed Murtaza

12. Experimental Results on Algebraic Analysis of Trivium and Tweaked Trivium
Mehreen Afzal, Ashraf Masood

13. Secure Repayable Storage System
T. M. Alkharobi

14. A Generalized Model of E-trading for GSR Fair Exchange Protocol
Debajyoti Konar, Chandan Mazumdar

15. Mobile-PKI Service Model for Ubiquitous Environment
Inkyung Jeun, Kilsoo Chun

16. Supporting Security against SYN Flooding Attack in Distributed DoS Via Measuring IPFIX-Based Traffic
H. Alipour, M. Kashefi Kia, M. Esmaeili

17. Multisensor Message Exchange Mechanism
Cyril Onwubiko

18. Spam Filtering without Text Analysis
Sihem Belabbes, Gilles Richard

19. Collaborative Approach to Network Behavior Analysis
Martin Rehak, Michal Pechoucek, Martin Grill, Karel Bartos, Pavel Celeda, Vojtech Krmicek

20. Making Concurrent Switching with Input-Output-Queued Switches Practical
Yi Dai, Zhi-gang Sun, Jin-shu Su

21. User Dynamics in Graphical Authentication Systems
Kenneth Revett, Hamid Jahankhani, Sérgio Tenreiro Magalhães, Henrique M. D. Santos

22. Improved Results on Algebraic Cryptanalysis of A5/2
Mehreen Afzal, Ashraf Masood, Naveed Shehzad

23. A Logic for Inclusion of Administrative Domains and Administrators in Multi-domain Authorization
Zeinab Iranmanesh, Morteza Amini, Rasool Jalili

24. Quantum Key Distribution
Ch. Seshu

25. A Survey of User Authentication Based on Mouse Dynamics
Kenneth Revett, Hamid Jahankhani, Sérgio Tenreiro Magalhães, Henrique M. D. Santos

26. Decoding Algorithm of Low Density Parity Check Code
Laouini Nassib, Hamdi Omessad, Bouallegue Ammar

27. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP
Manel Chenait

28. Secure Biometrically Based Authentication Protocol for a Public Network Environment
Bobby Tait, Basie Solms

29. Another Security Improvement over the Lin et al.’s E-voting Scheme
Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh

30. A Meta-process for Information Security Risk Management
Katerina Papadaki, Nineta Polemi, Dimitrios Kon/nos Damilos

31. Security Issues in mGovernment
Manish Kumar, M. Hanumanthappa, Bhavanam Lakshma Reddy

32. Mobile Customer Relationship Management and Mobile Security
Ali Sanayei, Abas Mirzaei

33. E-Commerce and Security Governance in Developing Countries
Ali. Sanayei, Lila Rajabion

34. IT Governance Metrics, Measurements and Benchmarking
Vernon Poole

35. Web Services Security – Implementation and Evaluation Issues
Elias Pimenidis, Christos K. Georgiadis, Peter Bako, Vassilis Zorkadis

36. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP
Manel Chenait

DRM-restrictions

Printing: not available
Clipboard copying: not available

Keywords: COMPUTERS / Computer Science COM014000

Author(s)
 
 
Publisher
Springer
Publication year
2008
Language
en
Edition
1
Category
Information Technology, Telecommunications
Format
Ebook
eISBN (PDF)
9783540694038

Similar titles