1. FGIT-SecTech 2009: Jeju Island, Korea
Dominik Slezak, Tai-Hoon Kim, Wai-Chi Fang, Kirk P. Arnett (Eds.): Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Springer 2009 Communications in Computer and Information Science 58 ISBN 978-3-642-10846-4
Hsiang-Cheh Huang, Feng-Cheng Chang, Wai-Chi Fang: Applications of Reversible Data Hiding Techniques with the Quick Response Codes. 1-8
Abdulaziz S. Almazyad, Yasir Ahmad: A New Approach in T-FA Authentication with OTP Using Mobile Phone. 9-17
Seyed Hossein Ahmadinejad, Saeed Jalili: Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows. 18-25

Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim: Analysis of Handwritten Signature Image. 43-50
Bo-heung Chung, Min-ho Han, Ki-young Kim: The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device. 51-56
DongHo Kang, BoHeung Jung, KiYoung Kim: Hardware Based Data Inspection for USB Data Leakage Prevention. 57-63
Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim: Grayscale Image Classification Using Supervised Chromosome Clustering. 64-71
Linda Ariani Gunawan, Peter Herrmann, Frank Alexander Kraemer: Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models. 72-85
Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi: Hierarchical Identity-Based Identification Schemes. 93-99
Jaeseung Hong, Jongwung Kim, Jeonghun Cho: The Trend of the Security Research for the Insider Cyber Threat. 100-107
Gaoshou Zhai, Hanhui Niu, Na Yang, Minli Tian, Chengyu Liu, Hengsheng Yang: Security Testing for Operating System and Its System Calls. 116-123
Haimin Jin, Duncan S. Wong, Yinlong Xu: Efficient Group Signature with Forward Secure Revocation. 124-131
Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Chengkun Wu: Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion. 132-139
Tie-Ming Liu, Liehui Jiang, Hong-qi He, Ji-zhong Li, Xian Yu: Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code. 140-147
Yonglong Wei, Xiaojuan Zheng, Jinglei Ren, Xudong Zheng, Chen Sun, Zhenhao Li: Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code. 148-156
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing: Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature. 157-164
Seokung Yoon, Hyuncheol Jung, Kyung-Seok Lee: A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network. 165-175
Jieren Cheng, Boyun Zhang, Jianping Yin, Yun Liu, Zhiping Cai: DDoS Attack Detection Using Three-State Partition Based on Flow Interaction. 176-184
Jae-goo Jeong, Seung-yong Hur, Gang-Soo Lee: A Development of Finite State Machine Create Tool for Cryptography Module Validation. 185-192
Yuan Tian, Biao Song, Eui-nam Huh: A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments. 193-200
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing: Fusion of Multiple Matchers Using SVM for Offline Signature Identification. 201-208
Sheikh Ziauddin: A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card. 209-216
Peter Pecho, Jan Nagy, Petr Hanácek, Martin Drahanský: Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors. 217-224
Martin Drahanský, Filip Orság, Petr Hanácek: Accelerometer Based Digital Video Stabilization for Security Surveillance Systems. 225-233
Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan S. Wong: Escrowed Deniable Identification Schemes. 234-241
Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng: Insights into Malware Detection and Prevention on Mobile Phones. 242-249
Mohammad Tabatabai Irani, Edgar R. Weippl: Automation of Post-exploitation - (Focused on MS-Windows Targets). 250-257
Filip Orság: Speaker Dependent Frequency Cepstrum Coefficients. 258-264
David A. Carvalho, Manuela Pereira, Mário M. Freire: Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection. 265-272
Brian King: A Simple Encryption Scheme for Binary Elliptic Curves. 273-280
M. S. V. S. Bhadri Raju, B. Vishnu Vardhan, G. A. Naidu, L. Pratap Reddy, A. Vinaya Babu: Analysis of Text Complexity in a Crypto System - A Case Study on Telugu. 281-288
Chengkun Wu, Jianping Yin, Zhiping Cai, En Zhu, Jieren Cheng: An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU. 298-305



