: Hamid Jahankhani, Kenneth Revett, Dominic Palmer-Brown
: Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008, Proceedings
: Springer-Verlag
: 9783540694038
: 1
: CHF 52,40
:
: Sonstiges
: English
: 313
: DRM
: PC/MAC/eReader/Tablet
: PDF

This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held in London, UK, in June 2008. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on cybercrime and digital forensics investigation, voice and video over internet protocols security, computer security, security architecture and authorisations, and IT governance.

Title Page2
Preface5
Organization6
Table of Contents8
Cybercrime and Digital Forensics Investigation11
Global E-Security12
Introduction12
Cybercrime13
Money Laundering14
Voice over Internet Protocol (VoIP)14
Using Unsecured Networks16
Spam17
Conclusions18
How to Find Exculpatory and Inculpatory Evidence Using a Circular Digital Forensics Process Model19
Introduction19
Previous Work19
A Process Model for Inculpatory and Exculpatory Cases20
Initialization20
Evidence Collection21
Evidence Examination and Analysis22
Presentation24
Case Termination24
Process-Wide Activities25
Documentation25
Preservation25
Management25
Tools Usage25
Conclusion25
References26
Identity Theft: A Study in Contact Centres27
Introduction27
Definition27
Mechanisms28
Identity Theft within Contact Centres29
Research Method29
Results30
The Market for Customer’s Details30
Security Practices within Contact Centres30
Conclusions33
References33
A Reasoning Agent for Credit Card Fraud on the Internet Using the Event Calculus35
Introduction35
Transactions36
Introduction to Card-Not-Present Transactions36
Merchant Goals38
Modelling Transaction Security39
Background39
The Event Calculus40
Discovering Attacks41
Internet Credit Card Transaction Scenario42
Purchase Scenario42
Purchase Code43
Reasoning about Fraud44
Conclusions and Further Work46
References47
Trends in Smartcard Fraud49
Introduction49
Types of Card Fraud50
Counterfeit Card Fraud50
Skimming51
Lost and Stolen Fraud51
Mail Non-receipt52
Card Not Present52
Card ID Theft52
Likely Trends52
Stakeholders53
Risk Assessment54
Summary and Conclusions55
References56
Tracking Online Trails57
Introduction57
Tracking Internet Trails58
Difficulties in Locating Trails60
Changing the Sender’s Address60
Using Online Proxy Servers61
Using Online Anonymous Services61
Using Vulnerable Third Party Computers61
Points to Consider61
Conclusion62
References62
Evaluation of Tools for Protection of Interest against Hacking and Cracking63
Voice and Video over Internet Protocols Security68
Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks69
Introduction69
Description of Attacks69
Testing SIP Dialog Verification70
Discussion of Results71
Conclusion72
References72
Covert Channels in SIP for VoIP Signalling73
Introduction73
VoIP Communication Flow74
VoIP Signalling Covert Channels Overview and New Insights75
IP/TCP/UDP Protocols Steganography75
SIP/SDP Protocols Steganography76
Evaluation of Total Covert Data Transferred in VoIP Signalling79
Conclusions79
References80
Secure Recognition of Voice-Less Commands Using Videos81
Introduction81
Mouth Movement Representation83
Feature Extraction84
Classification84
Experiments85
Results and Discussion86
Summary87
References88
An Extended Secret Sharing Scheme for Color Images with Fixed Pixel Expansion89
Introduction89
Colored Visual Cryptography90
Verheul and Tilborg’s Basic Colored Secret Sharing Scheme90
Rijmen and Preneel’s Colored Secret Sharing Scheme91
Bit-Level Colored Secret Sharing91
Extended Visual Cryptography92
Chang, Tsai, Chen’s Scheme for Colored Images92
Chang, Yu’s Scheme for Gray Images93
Proposed Scheme for Colored Images93
Hiding Algorithm94
Recovering Algorithm95
Results95
Conclusion96
References96
Computer Security98
Experimental Results on Algebraic Analysis of Trivium and Tweaked Trivium99
Introduction99
Brief Description of Trivium100
Solving Algebraic E