Advances in Information Security and Its Application

Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

  • Jong Hyuk Park
  • Justin Zhan
  • Changhoon Lee
  • Guilin Wang
  • Tai-hoon Kim
  • Sang-Soo Yeo
Conference proceedings ISA 2009

Part of the Communications in Computer and Information Science book series (CCIS, volume 36)

Table of contents

  1. Front Matter
  2. Information Assurance and Its Application

  3. Security Protocol and Its Application

    1. Chia-Chu Chiang, Coskun Bayrak
      Pages 37-42
    2. Yong Nyuo Shin, In-Kyung Jun, Hyun Kim, Woochang Shin
      Pages 43-49
    3. Xiaofei Ding, Fushan Wei, Chuangui Ma, Shumin Chen
      Pages 50-56
    4. Fahed Al-Neyadi, Jemal H. Abawajy
      Pages 68-77
  4. Other Security Research

    1. Yoon-Su Jeong, Yong-Tae Kim, Young-Bok Cho, Ki-Jeong Lee, Gil-Cheol Park, Sang-Ho Lee
      Pages 85-90
    2. Bingyang Li, Huiqiang Wang, Guangsheng Feng
      Pages 98-104
    3. Yi Han, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai
      Pages 105-110
    4. Bin-Hui Chou, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai
      Pages 111-118
    5. Antonio Savoldi, Paolo Gubian
      Pages 119-126
  5. Back Matter

Other volumes

  1. Advances in Information Security and Its Application
    Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
  2. Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

About these proceedings


This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009.

The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application; security protocol and its application, other security research.


Firewall ISDF authentication cryptographic hardware data security fingerprint detection hardware token key exchange manet networks role-based access security security metrics security patterns worm

Editors and affiliations

  • Jong Hyuk Park
    • 1
  • Justin Zhan
    • 2
  • Changhoon Lee
    • 3
  • Guilin Wang
    • 4
  • Tai-hoon Kim
    • 5
  • Sang-Soo Yeo
    • 6
  1. 1.Department of Computer Science and EngineeringKyungnam UniversityMasanKorea
  2. 2.Carnegie Mellon CyLab JapanKobeJapan
  3. 3.Center for Information Security Technologies(CIST)Korea UniversitySeoulKorea
  4. 4.School of Computer ScienceUniversity of BirminghamBirminghamUK
  5. 5.School of MultimediaHannam UniversityDaejeonKorea
  6. 6.Division of Computer EngineeringMokwon UniversityDaejeonKorea

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-02632-4
  • Online ISBN 978-3-642-02633-1
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • Buy this book on publisher's site
Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment
Oil, Gas & Geosciences