Buch, Englisch, Band 76, 350 Seiten, Gewicht: 510 g
4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings
Buch, Englisch, Band 76, 350 Seiten, Gewicht: 510 g
Reihe: Communications in Computer and Information Science
ISBN: 978-3-642-13364-0
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Wartung & Reparatur
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
Weitere Infos & Material
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition.- Security Improvement on a Remote User Authentication Scheme Using Smart Cards.- Dual-Byte-Marker Algorithm for Detecting JFIF Header.- Hiding Data in JPEG Using in-DQT Technique.- An Analysis of Syndrome Coding.- Intrusion Correlation Using Ontologies and Multi-agent Systems.- Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN.- Fault Attacks against the Miller’s Algorithm in Edwards Coordinates.- A Cryptosystem for Encryption and Decryption of Long Confidential Messages.- Lane Design for Speed Optimization.- Biometric Authentication Using Infrared Imaging of Hand Vein Patterns.- IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach.- Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks.- Pattern Recognition Using Artificial Neural Network: A Review.- PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks.- Tracing Potential School Shooters in the Digital Sphere.- Infrastructure Aided Privacy Preserving-Authentication in VANETs.- Attacks on Bluetooth Security Architecture and Its Countermeasures.- Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication.- Security Risks of Cloud Computing and Its Emergence as 5th Utility Service.- Performance Evaluation of Video Streaming in Vehicular Adhoc Network.- Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network.- Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.- MPLS Unleashed: Remedy Using IPSEC over MPLS VPN.- A New Holistic Security Approach for Government CriticalSystems: Flooding Prevention.- Sensor Aided Authentication.- Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection.- TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones.- An Improved EKG-Based Key Agreement Scheme for Body Area Networks.- Multi-agent Reinforcement Learning Model for Effective Action Selection.