3. FGIT-SecTech 2011: Jeju Island, Korea
Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, L. Javier García-Villalba, Kirk P. Arnett, Muhammad Khurram Khan (Eds.): Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings. Springer 2011 Communications in Computer and Information Science 259 ISBN 978-3-642-27188-5
Vivy Suhendra: A Survey on Access Control Deployment. 11-20
Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake: Data Anonymity in Multi-Party Service Model. 21-30
Yu Chen, Vrizlynn L. L. Thing: A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification. 31-42
Yindong Chen: A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic Immunity. 43-52
Vrizlynn L. L. Thing, Wee-Yong Lim, Junming Zeng, Darell J. J. Tan, Yu Chen: Design of a Modular Framework for Noisy Logo Classification in Fraud Detection. 53-64
Yi-Ming Chen, Cheng-En Chuang, Hsu-Che Liu, Cheng-Yi Ni, Chun-Tang Wang: Using Agent in Virtual Machine for Interactive Security Training. 65-74
Theodosios Tsiakis, Aristeidis Chatzipoulidis, Theodoros Kargidis, Athanasios Belidis: Information Technology Security Governance Approach Comparison in E-banking. 75-84
Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Tai-Hoon Kim: A Fast and Secure One-Way Hash Function. 85-93
Gulshan Kumar, Mritunjay Kumar Rai, Gang-soo Lee: An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher. 101-112
Bo Zhang: An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model. 123-127
Pranab Kumar Dhar, Mohammad Ibrahim Khan, Sunil Dhar, Jong-Myon Kim: Robust Audio Watermarking Scheme Based on Short Time Fourier Transformation and Singular Value Decomposition. 128-138
Sunguk Lee, Taeheon Kang, Rosslin John Robles, Sung-gyu Kim, Byungjoo Park: A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks. 139-145
David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forné: An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval. 146-154
Panayotis E. Nastou, Yannis C. Stamatiou: A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs. 155-166
Hae-Jung Kim, Eun-Jun Yoon: Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol. 167-176
Guo-Hui Zhou: An Effective Distance-Computing Method for Network Anomaly Detection. 177-182
Danilo Valeros Bernardo, Doan B. Hoang: Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT. 183-194
F. Eid Heba, Mostafa A. Salama, Aboul Ella Hassanien, Tai-Hoon Kim: Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification. 195-203
Yuan Tian, Biao Song, Eui-nam Huh: A Parameterized Privacy-Aware Pub-sub System in Smart Work. 204-214
Ruo Ando, Kuniyasu Suzaki: A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation. 215-227
Abdelouahed Gherbi, Robert Charpentier: Diversity-Based Approaches to Software Systems Security. 228-237



