ISA 2010: Miyazaki, Japan
Samir Kumar Bandyopadhyay, Wael Adi, Tai-Hoon Kim, Yang Xiao (Eds.): Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Springer 2010 Communications in Computer and Information Science 76 ISBN 978-3-642-13364-0
Phalguni Gupta, Dakshina Ranjan Kisku, Jamuna Kanta Sing, Massimo Tistarelli: Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition. 1-8
Tien-Ho Chen, Han-Cheng Hsiang, Wei-Kuan Shih: Security Improvement on a Remote User Authentication Scheme Using Smart Cards. 9-16
Kamaruddin Malik Mohamad, Tutut Herawan, Mustafa Mat Deris: Dual-Byte-Marker Algorithm for Detecting JFIF Header. 17-26
Kamaruddin Malik Mohamad, Tutut Herawan, Mustafa Mat Deris: Hiding Data in JPEG Using in-DQT Technique. 27-36
Gustavo A. Isaza, Andrés G. Castillo, Marcelo López, Luis Fernando Castillo, Manuel López: Intrusion Correlation Using Ontologies and Multi-agent Systems. 51-63
Kijeong Lee, Byungjoo Park, Gil-Cheol Park: Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN. 64-71
Nadia El Mrabet: Fault Attacks against the Miller's Algorithm in Edwards Coordinates. 72-85
Debasis Giri, Prithayan Barua, P. D. Srivastava, Biswapati Jana: A Cryptosystem for Encryption and Decryption of Long Confidential Messages. 86-96
Debnath Bhattacharyya, Arijit Chakraborty, Feruza Sattarova Yusufovna, Young-hun Lee, Tai-Hoon Kim: Lane Design for Speed Optimization. 97-107
Debnath Bhattacharyya, A. Shrotri, S. C. Rethrekar, M. H. Patil, Farkhod A. Alisherov, Tai-Hoon Kim: Biometric Authentication Using Infrared Imaging of Hand Vein Patterns. 108-115
Maricel O. Balitanas, Tai-Hoon Kim: IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach. 116-127
Hae Young Lee, Tae Ho Cho, Hyung-Jong Kim: Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks. 128-137
Tai-Hoon Kim: Pattern Recognition Using Artificial Neural Network: A Review. 138-148
Zhifeng Xiao, Yang Xiao: PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks. 149-162
Jari Veijalainen, Alexander Semenov, Jorma Kyppö: Tracing Potential School Shooters in the Digital Sphere. 163-178
Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar: Infrastructure Aided Privacy Preserving-Authentication in VANETs. 179-189
Mian Muhammad Waseem Iqbal, Firdous Kausar, Muhammad Arif Wahla: Attacks on Bluetooth Security Architecture and Its Countermeasures. 190-197
Muhammad Asif Khan, Firdous Kausar, Ashraf Masood: Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication. 198-208
Mushtaq Ahmad: Security Risks of Cloud Computing and Its Emergence as 5th Utility Service. 209-219
Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya: Performance Evaluation of Video Streaming in Vehicular Adhoc Network. 220-224
Syed Sherjeel Ahmad Gilani, Muhammad Zubair, Zeeshan Shafi Khan: Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network. 225-232
Rehan Shafi, Aneel Rahim, Fahad Bin Muhaya, Shehzad Ashraf, Muhammad Sher: Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks. 233-240
Syed Noor-ul-Hassan Shirazi, Muhammad Asim, Muhammad Irfan, Nassar Ikram: MPLS Unleashed: Remedy Using IPSEC over MPLS VPN. 241-248
Mohammed A. Alhabeeb, Abdullah M. Almuhaideb, Phu Dung Le, Bala Srinivasan: A New Holistic Security Approach for Government Critical Systems: Flooding Prevention. 249-264
Raymond Wu, Keisuke Seki, Ryusuke Sakamoto, Masayuki Hisada: Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection. 278-285
Mohammad Nauman, Tamleek Ali: TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones. 286-297
Aftab Ali, Farrukh Aslam Khan: An Improved EKG-Based Key Agreement Scheme for Body Area Networks. 298-308
Sang Jo Youk, Bong Keun Lee: Multi-agent Reinforcement Learning Model for Effective Action Selection. 309-317



