Skip to main content
  • Conference proceedings
  • © 2013

IT Convergence and Security 2012

  • Contains academic and professional contributions on IT Convergence and Security
  • Covers the multidisciplinary field of IT Convergence and Security
  • Written by an international team of contributors
  • Includes supplementary material: sn.pub/extras

Part of the book series: Lecture Notes in Electrical Engineering (LNEE)

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (149 papers)

  1. Security Protocols and Applications

    1. An Identity-Based Ring Signcryption Scheme

      • Gaurav Sharma, Suman Bala, Anil K. Verma
      Pages 151-157
    2. A Secure DS-CDMA Technique with Capacity Enhancement for Ad Hoc Wireless Networks

      • Muhammad Zeeshan, Shoab Ahmed Khan, Muhammad Yasir Malik
      Pages 159-167
    3. A Study on Traceback of Illegal Users Using Anonymity Technology in BitTorrent

      • Geon II Heo, Nam Hun Kim, Ah Ra Jo, Sae In Choi, Won Hyung Park
      Pages 169-175
    4. Internet Anonymity in Syria, Challenges and Solution

      • T. Eissa, Gi-hwan Cho
      Pages 177-186
  2. Convergence Security

    1. Front Matter

      Pages 187-187
    2. Attribute-Based Encryption for Commercial Content Distribution

      • Hyoseung Kim, Seunghwan Park, Jong Hwan Park, Dong Hoon Lee
      Pages 205-213
  3. IT Convergence Applications

    1. Front Matter

      Pages 215-215
    2. Sensibility Extraction for Bicycle Design Using RFID Tag-Attached Crayons

      • Ho-Ill Jung, Seung-Jin Lee, Jeong-Hoon Kang, Min-Hyun Kim, Jong-Wan Kim, Bo-Hyun Lee et al.
      Pages 217-224
    3. A Study for Car Insurance Service Using Vehicle Real Time Information

      • Yong-Yoon Shin, Byung-Yun Lee
      Pages 241-246
    4. An MMU Virtualization for Embedded Systems

      • Sung-Hoon Son
      Pages 247-252
    5. The Design and Implementation of Start Stop System with Multi-Protocol in Automotive Smart Key System

      • Kyeong-Seob Kim, Yun-Sub Lee, In-Seong Song, Sang-Bang Choi
      Pages 253-259
    6. Multi-Port Register File Design and Implementation for the SIMD Programmable Shader

      • Kyeong-Seob Kim, Yun-Sub Lee, Sang-Bang Choi
      Pages 267-272

About this book

The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals.

The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

Editors and Affiliations

  • Convergence Security, Kyoung-gi University, Suwon, Gyeonggi-do, Korea, Republic of (South Korea)

    Kuinam J. Kim

  • Dept. of Computer Information Engineerin, Sangji University, Wonju-si Gangwon-do, Korea, Republic of (South Korea)

    Kyung-Yong Chung

About the editors

Kuinam J. Kim is a professor and chairman of the Department of Convergence Security at Kyoung-gi University(KGU) in Kyoung-gi, Korea. He is also President of the Center for Industry Security supported by Ministry of Knowledge and Economy, Korea. Professor Kim received Ph.D degree in Industrial Engineering from the Colorado State University. His current fields of specialization are internet-based computing models, computer and networks forensics, infrastructure security, software security, multimedia security, and scientific and technical information. He has been Principal Investigator of several multimillion dollar projects funded by government agencies. The projects include Center for Industry Security, funded by Ministry of Knowledge and Economy Korea, Active Security Mechanism based on Active Networking technique funded by Agency for Defense Development, Total Information Security Development for The Execution of the Future War funded by Ministry of National Defense Korea, Development of Knowledge Platform funded by Electronics and Telecommunications Research Institute. He has received several technical and publishing awards, and rewards including Minister of Knowledge Economy Commendation (Industry Technology Security) and Minister of Public Administration and Security Commendation (Digital Forensic).

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access