A Network Data Abstraction Method for Data Set Verification (English)
- New search for: Cho, Jaeik
- New search for: Choi, Kyuwon
- New search for: Shon, Taeshik
- New search for: Moon, Jongsub
- New search for: Cho, Jaeik
- New search for: Choi, Kyuwon
- New search for: Shon, Taeshik
- New search for: Moon, Jongsub
In:
Secure and Trust Computing, Data Management and Applications
1
;
54-62
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:A Network Data Abstraction Method for Data Set Verification
-
Contributors:Cho, Jaeik ( author ) / Choi, Kyuwon ( author ) / Shon, Taeshik ( author ) / Moon, Jongsub ( author )
-
Published in:Communications in Computer and Information Science ; 186, 1 ; 54-62
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:9 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Embedding High Capacity Covert Channels in Short Message Service (SMS)Rafique, M. Zubair / Khan, Muhammad Khurram / Alghatbar, Khaled / Farooq, Muddassar et al. | 2011
- 11
-
A Framework for Detecting Malformed SMS AttackRafique, M Zubair / Khan, Muhammad Khurram / Alghathbar, Khaled / Farooq, Muddassar et al. | 2011
- 21
-
A Metadata Model for Data Centric SecurityAziz, Benjmin / Crompton, Shirley / Wilson, Michael et al. | 2011
- 29
-
SecPAL4DSA: A Policy Language for Specifying Data Sharing AgreementsAziz, Benjamin / Arenas, Alvaro / Wilson, Michael et al. | 2011
- 37
-
Self-keying Identification Mechanism for Small DevicesBarczyński, Krzysztof / Błaśkiewicz, Przemysław / Klonowski, Marek / Kutyłowski, Mirosław et al. | 2011
- 45
-
A Software Architecture for Introducing Trust in Java-Based CloudsPodesser, Siegfried / Toegl, Ronald et al. | 2011
- 54
-
A Network Data Abstraction Method for Data Set VerificationCho, Jaeik / Choi, Kyuwon / Shon, Taeshik / Moon, Jongsub et al. | 2011
- 63
-
Efficient De-Fragmented Writeback for Journaling File SystemLim, Seung-Ho / Choi, Hyun Jin / Park, Jong Hyuk et al. | 2011
- 71
-
IMS Session Management Based on Usage ControlKaropoulos, Giorgos / Martinelli, Fabio et al. | 2011
- 79
-
Using Counter Cache Coherence to Improve Memory Encryptions Performance in Multiprocessor SystemsYuanyuan, Zhang / Junzhong, Gu et al. | 2011
- 88
-
Dynamic Combinatorial Key Pre-distribution Scheme for Heterogeneous Sensor NetworksYing, Bidi / Makrakis, Dimitrios / Mouftah, Hussein T. / Lu, Wenjun et al. | 2011
- 96
-
Exclusion Based VANETs (EBV)Al-Daraiseh, Ahmad A. / Moharrum, Mohammed A. et al. | 2011
- 105
-
Embedding Edit Distance to Allow Private Keyword Search in Cloud ComputingBringer, Julien / Chabanne, Hervé et al. | 2011
- 114
-
Efficient Secret Sharing SchemesLv, Chunli / Jia, Xiaoqi / Lin, Jingqiang / Jing, Jiwu / Tian, Lijun / Sun, Mingli et al. | 2011
- 122
-
Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level FusionLeng, Lu / Zhang, Jiashu / Chen, Gao / Khan, Muhammad Khurram / Bai, Ping et al. | 2011
- 130
-
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia CommunicationsKim, Cheonshik / Shin, Dongkyoo / Shin, Dongil / Zhang, Xinpeng et al. | 2011
- 139
-
An Ontology Based Information Security Requirements Engineering FrameworkChikh, Azeddine / Abulaish, Muhammad / Nabi, Syed Irfan / Alghathbar, Khaled et al. | 2011
- 147
-
Simulating Malicious Users in a Software Reputation SystemBorg, Anton / Boldt, Martin / Carlsson, Bengt et al. | 2011
- 157
-
Weak Keys of the Block Cipher SEED-192 for Related-Key Differential AttacksKim, Jongsung / Park, Jong Hyuk / Kim, Young-Gon et al. | 2011
- 164
-
The Method of Database Server Detection and Investigation in the Enterprise EnvironmentSon, Namheun / Lee, Keun-gi / Jeon, SangJun / Chung, Hyunji / Lee, Sangjin / Lee, Changhoon et al. | 2011
- 172
-
Sensitive Privacy Data Acquisition in the iPhone for Digital Forensic AnalysisJung, Jinhyung / Jeong, Chorong / Byun, Keunduk / Lee, Sangjin et al. | 2011
- 187
-
An Efficient Processing Scheme for Continuous Queries Involving RFID and Sensor Data StreamsPark, Jeongwoo / Lee, Kwangjae / Ryu, Wooseok / Kwon, Joonho / Hong, Bonghee et al. | 2011
- 193
-
Smart Warehouse Modeling Using Re-recording Methodology with Sensor TagLee, Gwangsoo / Ryu, Wooseok / Hong, Bonghee / Kwon, Joonho et al. | 2011
- 201
-
SIMOnt: A Security Information Management Ontology FrameworkAbulaish, Muhammad / Nabi, Syed Irfan / Alghathbar, Khaled / Chikh, Azeddine et al. | 2011
- 209
-
Using Bloom Filters for Mining Top-k Frequent Itemsets in Data StreamsKim, Younghee / Cho, Kyungsoo / Yoon, Jaeyeol / Kim, Ieejoon / Kim, Ungmo et al. | 2011
- 217
-
An RSN Tool : A Test Dataset Generator for Evaluating RFID MiddlewareRyu, Wooseok / Kwon, Joonho / Hong, Bonghee et al. | 2011
- 225
-
Design and Implementation of a Virtual Reader for Emulation of RFID Physical ReaderLee, Jiwan / Park, Jekwan / Ryu, Wooseok / Hong, Bonghee / Kwon, Joonho et al. | 2011
- 231
-
Adaptive Optimal Global Resource Scheduling for a Cloud-Based Virtualized Resource PoolDeng, Lingli / Yu, Qing / Peng, Jin et al. | 2011
- 241
-
Maximal Cliques Generating Algorithm for Spatial Co-location Pattern MiningKwan Kim, Seung / Kim, Younghee / Kim, Ungmo et al. | 2011