Advertisement

Table of contents

  1. Front Matter
    Pages i-xiii
  2. Security Fundamentals

  3. Industrial and Business Information Security

    1. Front Matter
      Pages 39-39
    2. ByungRae Cha, JaeHyun Seo, JongWon Kim
      Pages 41-50
    3. André van Cleeff, Trajce Dimkov, Wolter Pieters, Roel Wieringa
      Pages 51-67
    4. Yi-Chang Hsu, Jing-Jang Hwang
      Pages 69-79
    5. Sun-Moon Jo, Kyung-Yong Chung
      Pages 81-90
    6. Hyung-Jun Seo, Yoon-Cheol Choy
      Pages 111-120
  4. Security Protocols and Applications

    1. Front Matter
      Pages 121-121
    2. Hyochang Ahn, Yong-Hwan Lee, Han-Jin Cho, Sang-Burm Rhee, June-Hwan Lee
      Pages 123-127
    3. M. Arshad Awan, A. Sattar, Cheong Ghil Kim, Chung Pyo Hong, Shin Dug Kim
      Pages 129-143
    4. Inhwan Choi, Dongkun Shin
      Pages 145-149
    5. Byung Ki Kim, Jae Hyeok Jang, Kyung Woo Hur, Jeong Gun Lee, Young Woong Ko
      Pages 151-161
    6. Young-Joon Jang, Dongkun Shin
      Pages 163-168
    7. Jonghun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Lee, Kyung-Yong Chung
      Pages 169-177
    8. Si-Jung Kim, Do-Eun Cho, Bong-Han Kim
      Pages 179-189
    9. Yeong-Gyu Lim, Cheong Ghil Kim, Shin Dug Kim
      Pages 191-204
    10. Seung-Hyung Lee, Young-Jae Song
      Pages 217-221
    11. Ju-Geon Pak, Kee-Hyun Park
      Pages 239-251
  5. Convergence Security

    1. Front Matter
      Pages 265-265
    2. In-Pyo Cho, So-Hyang Ko, Hoon-Mo Yang, Cheong-Ghil Kim, Shin-Dug Kim
      Pages 267-279
    3. Chung-Pyo Hong, Muhammad Arshad Awan, Cheong-Ghil Kim, Shin-Dug Kim
      Pages 281-293
    4. Sung-Kwan Kang, Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee
      Pages 295-306
    5. Gui-Jung Kim, Jung-Soo Han
      Pages 317-323
    6. Kyu Chul Kim, Chan Jung Park, Ronny Yongho Kim
      Pages 325-329
    7. Sukhyun Lim, Hyung-Keun Jee, Jinyoung Youn, Junsuk Lee
      Pages 337-344
    8. Eun-Seok Lee, Jin-Hee Lee, Inwoo Jo, Byeong-Seok Shin
      Pages 345-356
    9. Jae-Young Lee, Kee-Baek Kim, Seok-Han Lee, Tae-Eun Kim, Jong-Soo Choi
      Pages 367-371
    10. Ahr-Hyun Lee, Seok-Han Lee, Jae-Young Lee, Tae-Eun Kim, Jong-Soo Choi
      Pages 373-378
    11. Reza Malekian, Abdul Hanan Abdullah
      Pages 379-388
    12. Sang-Wook Park, Tae-Eun Kim, Jong-Soo Choi
      Pages 389-405
  6. IT Convergence Applications

    1. Front Matter
      Pages 407-407
    2. Su-Jin Baek, Jong-Won Ko, Gui-Jung Kim, Jung-Soo Han, Young-Jae Song
      Pages 409-418
    3. Su-Jin Baek, Jung-Soo Han, Young-Jae Song
      Pages 419-423
    4. Sang-Jin Cha, Gahee Kim, Chol-Hee Jang, Geun-Sik Jo
      Pages 425-434
    5. Yoo Hyun, Ho-Il Jung, Kyung-Yong Chung
      Pages 435-444
    6. Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee
      Pages 445-454
    7. Hyun-Jun Kim
      Pages 455-461

About these proceedings

Introduction

As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task.

Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits:

1.      Introduction of the most recent information technology and its related ideas

2.      Applications and problems related to technology convergence, and its case studies

3.      Introduction of converging existing security techniques through convergence security

Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.

Keywords

Convergence Security Convergence data mining Data Mining Green convergence services IT Convergence Information technology convergence Information visualization Mobile Computing Multimedia Security Software Engineering

Editors and affiliations

  • Kuinam J. Kim
    • 1
  • Seong Jin Ahn
    • 2
  1. 1., Convergence SecurityKyoung-gi UniversitySuwon, Gyeonggi-doKorea, Republic of (South Korea)
  2. 2., Computer ScienceSungkyunkwan UniversitySuwon, Gyeonggi-doKorea, Republic of (South Korea)

Bibliographic information

  • DOI https://doi.org/10.1007/978-94-007-2911-7
  • Copyright Information Springer Science+Business Media B.V. 2012
  • Publisher Name Springer, Dordrecht
  • eBook Packages Engineering
  • Print ISBN 978-94-007-2910-0
  • Online ISBN 978-94-007-2911-7
  • Series Print ISSN 1876-1100
  • Series Online ISSN 1876-1119
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering