رکورد قبلیرکورد بعدی

" International Conference on Wireless, Intelligent, and Distributed Environment for Communication : "


Document Type : BL
Record Number : 864930
Main Entry : International Conference on Wireless, Intelligent, and Distributed Environment for Communication(2018 :, New Delhi, India)
Title & Author : International Conference on Wireless, Intelligent, and Distributed Environment for Communication : : WIDECOM 2018 /\ Isaac Woungang, Sanjay Kumar Dhurandher, editors.
Publication Statement : Cham :: Springer,, [2018]
: , ©2018
Series Statement : Lecture notes on data engineering and communication technologies ;; volume 18
Page. NO : 1 online resource :: illustrations
ISBN : 3030092828
: : 3319756257
: : 3319756265
: : 3319756273
: : 9783030092825
: : 9783319756257
: : 9783319756264
: : 9783319756271
: 9783319756257
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Intro; Preface; Acknowledgments; Contents; About the Authors; Tamper Detection Using Fragile Image Watermarking Based on Chaotic System; 1 Introduction; 2 Background; 2.1 Least Significant Bit: LSB Method; 2.2 Arnold Cat Map; 2.3 Logistics Maps; 3 Related Work; 4 Proposed Work; 4.1 Embedding Algorithm; 4.2 Extraction Algorithm; Experimental Result; Imperceptibility; Robustness; Comparative Analysis; 5 Conclusion; References; Cryptanalysis and Improvement of a User Authentication Scheme for SIP; 1 Introduction; 2 Preliminaries; 3 Review of Lu et al.'s Scheme; 3.1 Registration.
: 3.2 Mutual Authentication and Key Agreement3.3 Password Change Phase; 4 Weaknesses of Lu et al.'s Scheme; 4.1 Insider Attack; 4.2 User Anonymity; 5 Proposed Scheme; 5.1 Registration; 5.2 Mutual Authentication and Key Agreement; 5.3 Password Change Phase; 6 Mutual Authentication of Our Scheme Using BAN-Logic; 7 Security Analysis; 7.1 Anonymity; 7.2 Insider Attack; 7.3 Mutual Authentication; 7.4 Masquerade Attack; 7.5 Verifier Attack; 7.6 Perfect Forward Secrecy; 7.7 Replay Attack; 8 Performance Analysis; 8.1 Security Features; 8.2 Computational Cost; 9 Conclusion; References.
: Analysing, Designing, Implementation and Coding E-Commerce Through UX1 Introduction; 2 Vision and UX Scope; 3 *-6pt; 4 Methodology; 5 Results; 6 Conclusion; References; Performance Evaluation of GAER Over Various Crossover Techniques in Opportunistic Networks; 1 Introduction; 2 Related Work and Motivation; 3 Various Crossover Techniques; 3.1 One-Point Crossover; 3.2 Two-Point Crossover; 3.3 Uniform Crossover; 3.4 Random Permuting Crossover; 4 Tabular Illustration; 5 Simulation Setup; 6 Results and Analysis; 6.1 Performance Comparison at Different Number of Nodes.
: Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques1 Introduction; 2 Related Surveys; 3 Existing Techniques; 4 Conclusion and Future Work; References; Securing Fuzzy Commitment Scheme Against Decodability Attack-Based Cross-Matching; 1 Introduction; 2 Fuzzy Commitment Scheme; 3 Cross-Matching Attacks; 3.1 Exhaustive Search Attack; 3.2 Decodability Attack; 4 Preventing Decodability Attack-Based Cross-Matching; 4.1 Case 1: Both Hash Value and Auxiliary Data Is Available; 4.2 Case 2: Only Auxiliary Data Is Available; 5 Conclusions and Future Work.
Abstract : This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.
Subject : Computer networks, Congresses.
Subject : Wireless communication systems, Congresses.
Subject : Communications engineering-- telecommunications.
Subject : Computer networking communications.
Subject : Computer networks.
Subject : Microwave technology.
Subject : Network hardware.
Subject : TECHNOLOGY ENGINEERING-- Mechanical.
Subject : Wireless communication systems.
Dewey Classification : ‭621.384‬
LC Classification : ‭TK5103.2‬
Added Entry : Dhurandher, Sanjay Kumar
: Woungang, Isaac
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟