Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings: Communications in Computer and Information Science, cartea 89
Editat de Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalaien Limba Engleză Paperback – 7 iul 2010
Din seria Communications in Computer and Information Science
- 20% Preț: 308.40 lei
- 20% Preț: 633.74 lei
- 20% Preț: 307.62 lei
- 20% Preț: 320.11 lei
- 20% Preț: 621.55 lei
- 20% Preț: 625.13 lei
- 20% Preț: 316.37 lei
- 20% Preț: 319.80 lei
- 20% Preț: 621.73 lei
- 20% Preț: 622.03 lei
- 20% Preț: 624.52 lei
- Preț: 372.00 lei
- 20% Preț: 312.29 lei
- Preț: 365.78 lei
- 20% Preț: 318.38 lei
- 20% Preț: 316.97 lei
- 20% Preț: 314.32 lei
- 20% Preț: 621.24 lei
- 20% Preț: 320.73 lei
- 20% Preț: 316.37 lei
- 20% Preț: 316.97 lei
- 20% Preț: 320.90 lei
- 20% Preț: 631.40 lei
- 20% Preț: 307.20 lei
- 20% Preț: 318.38 lei
- 20% Preț: 320.90 lei
- 20% Preț: 312.91 lei
- 20% Preț: 625.93 lei
- 15% Preț: 614.21 lei
- 20% Preț: 619.07 lei
- 20% Preț: 314.63 lei
- 20% Preț: 320.11 lei
- 20% Preț: 999.46 lei
- 20% Preț: 792.30 lei
- 20% Preț: 622.03 lei
- 20% Preț: 1165.83 lei
- 20% Preț: 313.88 lei
- 20% Preț: 318.38 lei
- 20% Preț: 306.06 lei
- 20% Preț: 113.94 lei
- 20% Preț: 318.56 lei
- Preț: 367.42 lei
- 20% Preț: 470.58 lei
- 20% Preț: 711.20 lei
- 20% Preț: 319.32 lei
- 20% Preț: 310.74 lei
- 20% Preț: 388.47 lei
- 20% Preț: 317.77 lei
- 20% Preț: 506.42 lei
- 20% Preț: 637.50 lei
Preț: 628.27 lei
Preț vechi: 785.34 lei
-20% Nou
Puncte Express: 942
Preț estimativ în valută:
120.31€ • 129.91$ • 100.21£
120.31€ • 129.91$ • 100.21£
Carte tipărită la comandă
Livrare economică 06-20 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642144776
ISBN-10: 3642144772
Pagini: 651
Ilustrații: XX, 636 p. 286 illus.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.91 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642144772
Pagini: 651
Ilustrații: XX, 636 p. 286 illus.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.91 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
The Third International Conference on Network Security and Applications (CNSA 2010).- Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks.- Data Security in Local Area Network Based on Fast Encryption Algorithm.- Fuzzy Rule-Base Based Intrusion Detection System on Application Layer.- Trust Models in Wireless Sensor Networks: A Survey.- Load Balancing in Distributed Web Caching.- TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups.- Image Classification for More Reliable Steganalysis.- Security for High-Speed MANs/WANs.- Behavioral Analysis of Transport Layer Based Hybrid Covert Channel.- Efficient Encryption of Intra and Inter Frames in MPEG Video.- VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512.- Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks.- A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks.- Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks.- Wireless Mesh Networks: Routing Protocols and Challenges.- Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification.- Secured Paradigm for Mobile Databases.- Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks.- Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET.- A Flow Based Slow and Fast Scan Detection System.- A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices.- Concurrent Usage Control Implementation Verification Using the SPIN Model Checker.- Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory.- A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported bySTRBAC Model.- Detection and Classification of DDoS Attacks Using Fuzzy Inference System.- Detection and Recognition of File Masquerading for E-mail and Data Security.- Privacy Preserving Mining of Distributed Data Using Steganography.- First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P.- Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme.- Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks.- A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept.- Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise.- Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks.- Privacy Layer for Business Intelligence.- Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm.- Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing.- A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies.- BubbleTrust: A Reliable Trust Management for Large P2P Networks.- Dynamic Policy Adaptation for Collaborative Groups.- A Deviation Based Outlier Intrusion Detection System.- Privacy Preserving Ciphertext Policy Attribute Based Encryption.- Reliable Timeout Based Commit Protocol.- Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT).- Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges.- Reputation Enhancement in a Trust Management System.- A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks.- Design of a Reliability-based Source Routing Protocol for Wireless MobileAd Hoc Networks.- Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks.- Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis.- Knowledge Base Compound Approach towards Spam Detection.- Trust Management Framework for Ubiquitous Applications.- A Hybrid Address Allocation Algorithm for IPv6.- Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols.- A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network.- A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks.- Towards Designing Application Specific Trust Treated Model.- First International Workshop on Database Management Systems (DMS 2010) and MWNS 2010.- Security for Contactless Smart Cards Using Cryptography.- A Novel Approach for Compressed Video Steganography.- Privacy Preserving Data Mining by Cyptography.- A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure.- Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm.- Design and Implementation of Pessimistic Commit Protocols in Mobile Environments.- On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases.- Implementation of MPEG-7 Document Management System Based on Native Database.
Caracteristici
Up-to-date results Fast track conference proceedings State-of-the-art report