Shortcuts
Bitte warten Sie, bis die Seite geladen ist.
 
PageMenu- Hauptmenü-
Page content

Katalogdatenanzeige

Advances in Computing and Information Technology: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1

Advances in Computing and Information Technology: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1
Kataloginformation
Feldname Details
Vorliegende Sprache eng
Hinweise auf parallele Ausgaben 391267108 Buchausg. u.d.T.: ‡Advances in computing and information technology ; 1
ISBN 978-3-642-31512-1
Name Meghanathan, Natarajan
Nagamalai, Dhinaharan
Name ANZEIGE DER KETTE Nagamalai, Dhinaharan
Name Chaki, Nabendu
T I T E L Advances in Computing and Information Technology
Zusatz zum Titel Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1
Verlagsort Berlin, Heidelberg
Verlag Springer
Erscheinungsjahr 2012
2012
Umfang Online-Ressource (XXIV, 812 p. 403 illus, digital)
Reihe Advances in Intelligent Systems and Computing ; 176
Notiz / Fußnoten Description based upon print version of record
Weiterer Inhalt Title; Preface; Organization; Contents; Network Security and Applications; Networks and Communications; Wireless and Mobile Networks; Peer-to-Peer Networks and Trust Management; Intelligent Network-Based Intrusion Detection System (iNIDS); Introduction; NIDS and ANN; Signature Analysis and Anomaly Analysis; KDDCUP99 Dataset; JPCAP; Artificial Neural Networks; Implementation; Results; Conclusion; Future Work; References; Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password; Introduction; Preliminaries; Elliptic Curve Cryptography. Elliptic Curve Digital Signature AlgorithmProposed Protocol; Key Establishment Phase; Verification Phase; Analysis of the Proposed Protocol; Security Analysis; Performance Analysis; Conclusion; References; Securing Multi-agent Systems: A Survey; Introduction; Security Aspects often Overlooked When Designing Multi-agent Systems; Challenges in Multi-agent Systems; Conclusion; References; Personal Secret Information Based Authentication towards Preventing Phishing Attacks; Introduction; Previous Work; Personal Secret Information Based Authentication towards Preventing Phishing Attacks. Encryption SchemeDecryption Scheme; Advantages of Proposed Scheme; Conclusion and Future Work; References; Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis; Introduction; Constraints in Wireless Sensor Network; Attacks Related to Key Management and Routing; Key Distribution Schemes; Trusted Server Scheme; Self-enforcing Scheme; Pre-distribution Schemes; Conclusions; References; An Integrated Intrusion Detection System for Credit Card Fraud Detection; Introduction; Related Work; Proposed System; Anomaly Detection Module; Misuse Detection Module. Decision Making ModuleExperimental Results; Screen Shots; Conclusion; References; Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems; Introduction; Related Works; Software Works; Hardware Works; Performance Evaluation; Optimization; GCC; Optimization with GCC Predefined Optimization Levels; Optimization with Offered Optimization Level; Conclusion; References; ECDLP Based Proxy Multi-signature Scheme; Introduction; Preliminaries; Security Assumption; Tzer-Shyong Chen and Kuo-Hsuan et al.'s Proxy Multi-signature Scheme. Our Proposed Proxy Multi-signature SchemeSecurity Analysis; Conclusion; References; SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues; Introduction; Functions of VOIP; Essential Components of SIP; Security Threats in SIP; Registration Hijacking; Disguised Proxy; Spam over Internet Telephony (SPIT); IP Spoofed Flooding; Malformed Message; Session Tear Down; Enhancing the Security Mechanism in SIP; TLS over SIP; Internet Protocol Security (IPSec); Secure Real Time Protocol (SRTP); S/MIME; Conclusion; References. Host-Based Bot Detection Using Destination White-Lists for User's Profile
Titelhinweis Buchausg. u.d.T.: ‡Advances in computing and information technology ; 1
ISBN ISBN 978-3-642-31513-8
Klassifikation UYQ
COM004000
006.3
004.6
Q342
Kurzbeschreibung The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, that is composed of three different volumes.
SWB-Titel-Idn 36768862X
Signatur Springer E-Book
Bemerkungen Elektronischer Volltext - Campuslizenz
Elektronische Adresse $uhttp://dx.doi.org/10.1007/978-3-642-31513-8
Internetseite / Link Volltext
Siehe auch Inhaltsverzeichnis
Siehe auch Inhaltstext
Siehe auch Volltext
Siehe auch Cover
Kataloginformation500171670 Datensatzanfang . Kataloginformation500171670 Seitenanfang .
Vollanzeige Katalogdaten 

Auf diesem Bildschirm erhalten Sie Katalog- und Exemplarinformationen zum ausgewählten Titel.

Im Bereich Kataloginformation werden die bibliographischen Details angezeigt. Per Klick auf Hyperlink-Begriffe wie Schlagwörter, Autoren, Reihen, Körperschaften und Klassifikationen können Sie sich weitere Titel des gewählten Begriffes anzeigen lassen.

Der Bereich Exemplarinformationen enthält zum einen Angaben über den Standort und die Verfügbarkeit der Exemplare. Zum anderen haben Sie die Möglichkeit, ausgeliehene Exemplare vorzumerken oder Exemplare aus dem Magazin zu bestellen.
Schnellsuche