Security Technology
Editat de Dominik Slezaken Limba Engleză Paperback – 24 noi 2009
Preț: 322.40 lei
Preț vechi: 403.00 lei
-20% Nou
Puncte Express: 484
Preț estimativ în valută:
57.05€ • 66.90$ • 50.10£
57.05€ • 66.90$ • 50.10£
Carte tipărită la comandă
Livrare economică 09-23 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642108464
ISBN-10: 3642108466
Pagini: 324
Ilustrații: XIII, 308 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.49 kg
Ediția:2010
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642108466
Pagini: 324
Ilustrații: XIII, 308 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.49 kg
Ediția:2010
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Applications of Reversible Data Hiding Techniques with the Quick Response Codes.- A New Approach in T-FA Authentication with OTP Using Mobile Phone.- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.- A Study on Secure Contents Using in Urban Computing.- Shadow Generation Protocol in Linguistic Threshold Schemes.- Analysis of Handwritten Signature Image.- The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device.- Hardware Based Data Inspection for USB Data Leakage Prevention.- Grayscale Image Classification Using Supervised Chromosome Clustering.- Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models.- Impact of Malicious Node on Broadcast Schemes.- Hierarchical Identity-Based Identification Schemes.- The Trend of the Security Research for the Insider Cyber Threat.- MIMO Wiretap Channel: A Scalar Approach.- Security Testing for Operating System and Its System Calls.- Efficient Group Signature with Forward Secure Revocation.- Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.- Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.- Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code.- Feature Level Fusion of Biometrics Cues: Human Identification with Doddington’s Caricature.- A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network.- DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.- A Development of Finite State Machine Create Tool for Cryptography Module Validation.- A Privacy-Aware System Using Threat-Based Evaluation and Feedback Methodin Untrusted Ubiquitous Environments.- Fusion of Multiple Matchers Using SVM for Offline Signature Identification.- A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card.- Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.- Accelerometer Based Digital Video Stabilization for Security Surveillance Systems.- Escrowed Deniable Identification Schemes.- Insights into Malware Detection and Prevention on Mobile Phones.- Automation of Post-exploitation.- Speaker Dependent Frequency Cepstrum Coefficients.- Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.- A Simple Encryption Scheme for Binary Elliptic Curves.- Analysis of Text Complexity in a Crypto System – A Case Study on Telugu.- Symmetric-Key Encryption for Wireless Internet SCADA.- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.