Global security, safety, and sustainability & e-Democracy : 7th International and 4th e-Democracy Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised selected papers /

Saved in:
Bibliographic Details
Meeting name:International Conference on Global Security, Safety and Sustainability (7th : 2011 : Thessalonikē, Greece)
Imprint:Berlin ; New York : Springer, ©2012.
Description:1 online resource (xiv, 290 pages).
Language:English
Series:Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 99
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 99.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11077260
Hidden Bibliographic Details
Varying Form of Title:ICGS3 2011
E-Democracy 2011
Other authors / contributors:Georgiadia, Christos K.
International ICST Conference on e-Democracy (4th : 2011 : Thessalonikē, Greece)
ISBN:9783642334481
3642334482
9783642334474
Notes:Includes bibliographical references and author index.
Print version record.
Summary:This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety, and Sustainability (ICDS3), and of the 4th e-Democracy Joint Conferences (e-Democracy 2011) which were held in Thessaloniki in August 2011. The 37 revised full papers presented were carefully selected from numerous submissions. Conference papers promote research and development activities of innovative applications and methodologies and applied technologies.
Other form:Print version: Global security, safety, and sustainability. [S.l.] : Springer, 2012 3642334474
Standard no.:10.1007/978-3-642-33448-1
Table of Contents:
  • Transforming Vehicles into e-government 'Cloud Computing' Nodes / Dellios Kleanthis, Chronakis Aristeidis and Polemi Despoina
  • Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining / Stergios G. Tsiafoulis, Vasilios C. Zorkadis and Elias Pimenidis
  • Practical Password Harvesting from Volatile Memory / Stavroula Karayianni and Vasilios Katos
  • Applied Phon Curve Algorithm for Improved Voice Recognition and Authentication / B.L. Tait
  • Tuning the Epidemical Algorithm in Wireless Sensor Networks / Kostis Gerakos, Christos Anagnostopoulos and Stathes Hadjiefthymiades
  • A Robustness Testing Method for Network Security / Yulong Fu and Ousmane Kone
  • Economic Evaluation of Interactive Audio Media for Securing Internet Services / Theodosios Tsiakis, Panagiotis Katsaros and Dimitris Gritzalis
  • On the Evolution of Malware Species / Vasileios Vlachos, Christos Ilioudis and Alexandros Papanikolaou
  • PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security / Iosif Androulidakis and Gorazd Kandus
  • GSi Compliant RAS for Public Private Sector Partnership / Fawzi Fawzi, Rabih Bashroush and Hamid Jahankhani.
  • A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution / Vasiliki Liagkou, Effie Makri, Paul Spirakis and Yannis Stamatiou
  • Cryptographic Dysfunctionality-A Survey on User Perceptions of Digital Certificates / Dimitrios Zissis, Dimitrios Lekkas and Panayiotis Koutsabasis
  • Towards Colored Petri Net Modeling of Expanded C-TMAC / Apostolos K. Provatidis, Christos K. Georgiadis and Ioannis K. Mavridis
  • Leveraging the e-passport PKI to Achieve Interoperable Security for e-government Cross Border Services / Dimitrios Lekkas and Dimitrios Zissis
  • Genre-Based Information Hiding / Russell Ogilvie and George R.S. Weir
  • In the Hacker's Eye: The Neurophysiology of a Computer Hacker / Wael Khalifa, Kenneth Revett and Abdel-Badeeh Salem
  • Untangling Public Service Usage for Agribusinesses with Dialogic E-government / Sotiris Karetsos, Maria Ntaliani, Constantina Costopoulou and Alexander B. Sideridis
  • On the Deployment of Artificial Immune Systems for Biometrics / Ruben Krishnamurthy, Kenneth Revett and Hossein Jahankhani
  • A Prediction Model for Criminal Levels Specialized in Brazilian Cities / Marcelo Damasceno de Melo, Jerffeson Teixeira and Gustavo Campos.
  • MASSIF: A Promising Solution to Enhance Olympic Games IT Security / Elsa Prieto, Rodrigo Diaz, Luigi Romano, Roland Rieke and Mohammed Achemlal
  • An Ontology-Based Model for SIEM Environments / Gustavo Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem and Herve Debar
  • Analyzing the Economic Impacts of Security Breaches Due to Outsourcing / Dimitrios Koumaridis, Emmanouil Stiakakis and Christos K. Georgiadis
  • Study of the Perception on the Portuguese Citizen Card and Electronic Signature / Isabel Cerqueira, Vítor J. Sá and Sérgio Tenreiro de Magalhães
  • Securing Transportation-Critical Infrastructures: Trends and Perspectives / Marianthi Theoharidou, Miltiadis Kandias and Dimitris Gritzalis
  • E-Government in Greece: Serving State's Economic Needs
  • Respecting the Fundamental Right to Data Protection / Zoe Kardasiadou, Evi Chatziliasi and Konstantinos Limniotis
  • Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags / Hoda Jannati and Abolfazl Falahati
  • Paving the Way for a Transformational Public Administration / Ioannis Savvas, Nick Bassiliades, Elias Pimenidis and Alexander B. Sideridis.
  • Cybercrime: The Case of Obfuscated Malware / Mamoun Alazab, Sitalakshmi Venkatraman, Paul Watters, Moutaz Alazab and Ammar Alazab
  • Feeling Secure vs. Being Secure the Mobile Phone User Case / Iosif Androulidakis and Gorazd Kandus
  • A Collaborative System Offering Security Management Services for SMEs/mEs / Theodoros Ntouskas, Dimitrios Papanikas and Nineta Polemi
  • A Situational Awareness Architecture for the Smart Grid / Anastasia Mavridou and Mauricio Papa
  • Alleviating SMEs' Administrative Burdens: The Rural Inclusion Initiative / Maria Ntaliani, Constantina Costopoulou and Alexander B. Sideridis
  • Optimum Hardware-Architecture for Modular Divider in GF(2m) with Chaos as Arbitrary Source Based on ECC / Azar Hosseini and Abolfazl Falahati
  • Sufficiency of Windows Event Log as Evidence in Digital Forensics / Nurdeen M. Ibrahim, Ameer Al-Nemrat, Hamid Jahankhani and Rabih Bashroush
  • An Evaluation of the Initiatives and the Progress Made on e-government Services in the EU / Alexander B. Sideridis, Elias Pimenidis, Loucas Protopappas and M. Koukouli
  • Improved Awareness on Fake Websites and Detecting Techniques / Hossein Jahankhani, Thulasirajh Jayaraveendran and William Kapuku-Bwabw
  • Study of the Perception on the Biometric Technology by the Portuguese Citizens / Daniela Borges, Vítor J. Sá, Sérgio Tenreiro de Magalhães and Henrique Santos.