2. FGIT-SecTech/DRBC 2010: Jeju Island, Korea
Tai-Hoon Kim, Wai-Chi Fang, Muhammad Khurram Khan, Kirk P. Arnett, Heau-Jo Kang, Dominik Slezak (Eds.): Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Springer 2010 Communications in Computer and Information Science 122 ISBN 978-3-642-17609-8
Davrondzhon Gafurov, Patrick Bours, Bian Yang, Christoph Busch: Impact of Finger Type in Fingerprint Authentication. 1-7
Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz AlAjaji: Using Arabic CAPTCHA for Cyber Security. 8-17
Syed Irfan Nabi, Abdulrahman A. Mirza, Khaled Alghathbar: Information Assurance in Saudi Organizations - An Empirical Study. 18-28
Davrondzhon Gafurov: Emerging Biometric Modalities: Challenges and Opportunities. 29-38
Ju-Sung Kang, Okyeon Yi: On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP. 39-46
Syed Irfan Nabi, Syed Waqar Nabi, Syed Awais Ahmed Tipu, Bushra Haqqi, Zahra Abid, Khaled Alghathbar: Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan. 47-56
Kenji Yamamoto, Toshihiro Yamauchi: Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON. 57-67
Bo-heung Chung, Jung-nye Kim: Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device. 68-73
Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi: A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse. 84-93
Pranab Kumar Dhar, Mohammad Ibrahim Khan, Cheol Hong Kim, Jong-Myon Kim: An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection. 104-113
Pranab Kumar Dhar, Cheol Hong Kim, Jong-Myon Kim: Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model. 114-125
Hsiang-Cheh Huang, Ting-Hsuan Wang, Wai-Chi Fang: Histogram-Based Reversible Data Hiding with Quadtree Concepts. 126-133
Taehyoung Kim, Inhyuk Kim, Changwoo Min, Young Ik Eom: MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology. 134-141
Jemal H. Abawajy, Tai-Hoon Kim: Performance Analysis of Cyber Security Awareness Delivery Methods. 142-148
Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi: Proxy Re-encryption with Keyword Search: New Definitions and Algorithms. 149-160
Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar: One-Time Password System with Infinite Nested Hash Chains. 161-170
Davrondzhon Gafurov, Patrick Bours: Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor. 179-186
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing: Fusion of Moving and Static Facial Features for Robust Face Recognition. 187-196
Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik: Human Authentication Based on ECG Waves Using Radon Transform. 197-206
Mushtaq Ahmad: Wireless Network Security Vulnerabilities and Concerns. 207-219
Zeeshan Shafi Khan, Khaled Alghathbar, Muhammad Sher, Khalid Rashid: Issues of Security and Network Load in Presence - A Survey. 224-230
Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar: Contactless Biometrics in Wireless Sensor Network: A Survey. 236-243
Abdullah Sharaf Alghamdi, Syed Amanullah Quadri, Iftikhar Ahmad, Khalid Al-Nafjan: A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems. 244-249
A. J. Clark, Patton Holliday, Robyn Chau, Harris Eisenberg, Melinda Chau: Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010. 250-258
Wei Huang, Arthur Mynnet: Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model. 259-268
Rosslin John Robles, Haeng-Kon Kim, Tai-Hoon Kim: Internet SCADA Utilizing API's as Data Source. 269-275
Maricel O. Balitanas, Tai-Hoon Kim: Insecure Information System's Solution Using Isolation Method. 276-281
Rosslin John Robles, Tai-Hoon Kim: Communication Security for Control Systems in Smart Grid. 282-289
Raed Alosaimy, Khaled Alghathbar, Alaaeldin M. Hafez, Mohamed Hamdy Eldefrawy: NMACA Approach Used to Build a Secure Message Authentication Code. 290-298



