Vorliegende Sprache |
eng |
Hinweise auf parallele Ausgaben |
391267108 Buchausg. u.d.T.: ‡Advances in computing and information technology ; 1 |
ISBN |
978-3-642-31512-1 |
Name |
Meghanathan, Natarajan |
Nagamalai, Dhinaharan |
Name ANZEIGE DER KETTE |
Nagamalai, Dhinaharan |
Name |
Chaki, Nabendu |
T I T E L |
Advances in Computing and Information Technology |
Zusatz zum Titel |
Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1 |
Verlagsort |
Berlin, Heidelberg |
Verlag |
Springer |
Erscheinungsjahr |
2012 |
2012 |
Umfang |
Online-Ressource (XXIV, 812 p. 403 illus, digital) |
Reihe |
Advances in Intelligent Systems and Computing ; 176 |
Notiz / Fußnoten |
Description based upon print version of record |
Weiterer Inhalt |
Title; Preface; Organization; Contents; Network Security and Applications; Networks and Communications; Wireless and Mobile Networks; Peer-to-Peer Networks and Trust Management; Intelligent Network-Based Intrusion Detection System (iNIDS); Introduction; NIDS and ANN; Signature Analysis and Anomaly Analysis; KDDCUP99 Dataset; JPCAP; Artificial Neural Networks; Implementation; Results; Conclusion; Future Work; References; Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password; Introduction; Preliminaries; Elliptic Curve Cryptography. Elliptic Curve Digital Signature AlgorithmProposed Protocol; Key Establishment Phase; Verification Phase; Analysis of the Proposed Protocol; Security Analysis; Performance Analysis; Conclusion; References; Securing Multi-agent Systems: A Survey; Introduction; Security Aspects often Overlooked When Designing Multi-agent Systems; Challenges in Multi-agent Systems; Conclusion; References; Personal Secret Information Based Authentication towards Preventing Phishing Attacks; Introduction; Previous Work; Personal Secret Information Based Authentication towards Preventing Phishing Attacks. Encryption SchemeDecryption Scheme; Advantages of Proposed Scheme; Conclusion and Future Work; References; Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis; Introduction; Constraints in Wireless Sensor Network; Attacks Related to Key Management and Routing; Key Distribution Schemes; Trusted Server Scheme; Self-enforcing Scheme; Pre-distribution Schemes; Conclusions; References; An Integrated Intrusion Detection System for Credit Card Fraud Detection; Introduction; Related Work; Proposed System; Anomaly Detection Module; Misuse Detection Module. Decision Making ModuleExperimental Results; Screen Shots; Conclusion; References; Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems; Introduction; Related Works; Software Works; Hardware Works; Performance Evaluation; Optimization; GCC; Optimization with GCC Predefined Optimization Levels; Optimization with Offered Optimization Level; Conclusion; References; ECDLP Based Proxy Multi-signature Scheme; Introduction; Preliminaries; Security Assumption; Tzer-Shyong Chen and Kuo-Hsuan et al.'s Proxy Multi-signature Scheme. Our Proposed Proxy Multi-signature SchemeSecurity Analysis; Conclusion; References; SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues; Introduction; Functions of VOIP; Essential Components of SIP; Security Threats in SIP; Registration Hijacking; Disguised Proxy; Spam over Internet Telephony (SPIT); IP Spoofed Flooding; Malformed Message; Session Tear Down; Enhancing the Security Mechanism in SIP; TLS over SIP; Internet Protocol Security (IPSec); Secure Real Time Protocol (SRTP); S/MIME; Conclusion; References. Host-Based Bot Detection Using Destination White-Lists for User's Profile |
Titelhinweis |
Buchausg. u.d.T.: ‡Advances in computing and information technology ; 1 |
ISBN |
ISBN 978-3-642-31513-8 |
Klassifikation |
UYQ |
COM004000 |
006.3 |
004.6 |
Q342 |
Kurzbeschreibung |
The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, that is composed of three different volumes. |
SWB-Titel-Idn |
36768862X |
Signatur |
Springer E-Book |
Bemerkungen |
Elektronischer Volltext - Campuslizenz |
Elektronische Adresse |
$uhttp://dx.doi.org/10.1007/978-3-642-31513-8 |
Internetseite / Link |
Volltext |
Siehe auch |
Inhaltsverzeichnis |
Siehe auch |
Inhaltstext |
Siehe auch |
Volltext |
Siehe auch |
Cover |