Shortcuts
Top of page (Alt+0)
Page content (Alt+9)
Page menu (Alt+8)
Your browser does not support javascript, some WebOpac functionallity will not be available.
PageMenu
-
Hauptmenü
-
Suchmenü
Einfache Suche
.
Erweiterte Suche
.
Zeitschriften-Suche
.
Suchergebnisse verfeinern
.
Neuerwerbungsliste nach Gruppen
.
Sortierreihenfolge
.
Benutzerdienste
Nutzeranmeldung
.
Mein Konto
.
Erwerbungsvorschlag
.
Fernleihe
.
Vormerkung
.
Verlängerung
.
Weitere Recherchemöglichkeiten
Datenbankinfosystem (DBIS)
.
Karlsruher virtueller Katalog (KVK)
.
Regensburger Systematik (RVK)
.
Elektronische Zeitschriften (EZB)
.
Zeitschriftendatenbank (ZDB)
.
Sitzung beenden
Katalog verlassen
.
Homepage WHZ
.
Hochschulbibliothek
.
© LIBERO v6.4.1sp240211
Page content
Sie befinden sich hier
:
Katalogdatenanzeige
Katalogdatenanzeige
Advances in Computing and Information Technology: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1
.
Bookmark für diesen Satz setzen
Katalogdatensatz500171670
.
.
Wikipedia-Verfasserlink
.
.
LibraryThing
.
Kataloginformation
Katalogdatensatz500171670
.
Kataloginformation
Feldname
Details
Vorliegende Sprache
eng
Hinweise auf parallele Ausgaben
391267108 Buchausg. u.d.T.: ‡Advances in computing and information technology ; 1
ISBN
978-3-642-31512-1
Name
Meghanathan, Natarajan
Nagamalai, Dhinaharan
Name ANZEIGE DER KETTE
Nagamalai, Dhinaharan
Name
Chaki, Nabendu
T I T E L
Advances in Computing and Information Technology
Zusatz zum Titel
Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1
Verlagsort
Berlin, Heidelberg
Verlag
Springer
Erscheinungsjahr
2012
2012
Umfang
Online-Ressource (XXIV, 812 p. 403 illus, digital)
Reihe
Advances in Intelligent Systems and Computing ; 176
Notiz / Fußnoten
Description based upon print version of record
Weiterer Inhalt
Title; Preface; Organization; Contents; Network Security and Applications; Networks and Communications; Wireless and Mobile Networks; Peer-to-Peer Networks and Trust Management; Intelligent Network-Based Intrusion Detection System (iNIDS); Introduction; NIDS and ANN; Signature Analysis and Anomaly Analysis; KDDCUP99 Dataset; JPCAP; Artificial Neural Networks; Implementation; Results; Conclusion; Future Work; References; Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password; Introduction; Preliminaries; Elliptic Curve Cryptography. Elliptic Curve Digital Signature AlgorithmProposed Protocol; Key Establishment Phase; Verification Phase; Analysis of the Proposed Protocol; Security Analysis; Performance Analysis; Conclusion; References; Securing Multi-agent Systems: A Survey; Introduction; Security Aspects often Overlooked When Designing Multi-agent Systems; Challenges in Multi-agent Systems; Conclusion; References; Personal Secret Information Based Authentication towards Preventing Phishing Attacks; Introduction; Previous Work; Personal Secret Information Based Authentication towards Preventing Phishing Attacks. Encryption SchemeDecryption Scheme; Advantages of Proposed Scheme; Conclusion and Future Work; References; Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis; Introduction; Constraints in Wireless Sensor Network; Attacks Related to Key Management and Routing; Key Distribution Schemes; Trusted Server Scheme; Self-enforcing Scheme; Pre-distribution Schemes; Conclusions; References; An Integrated Intrusion Detection System for Credit Card Fraud Detection; Introduction; Related Work; Proposed System; Anomaly Detection Module; Misuse Detection Module. Decision Making ModuleExperimental Results; Screen Shots; Conclusion; References; Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems; Introduction; Related Works; Software Works; Hardware Works; Performance Evaluation; Optimization; GCC; Optimization with GCC Predefined Optimization Levels; Optimization with Offered Optimization Level; Conclusion; References; ECDLP Based Proxy Multi-signature Scheme; Introduction; Preliminaries; Security Assumption; Tzer-Shyong Chen and Kuo-Hsuan et al.'s Proxy Multi-signature Scheme. Our Proposed Proxy Multi-signature SchemeSecurity Analysis; Conclusion; References; SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues; Introduction; Functions of VOIP; Essential Components of SIP; Security Threats in SIP; Registration Hijacking; Disguised Proxy; Spam over Internet Telephony (SPIT); IP Spoofed Flooding; Malformed Message; Session Tear Down; Enhancing the Security Mechanism in SIP; TLS over SIP; Internet Protocol Security (IPSec); Secure Real Time Protocol (SRTP); S/MIME; Conclusion; References. Host-Based Bot Detection Using Destination White-Lists for User's Profile
Titelhinweis
Buchausg. u.d.T.: ‡Advances in computing and information technology ; 1
ISBN
ISBN 978-3-642-31513-8
Klassifikation
UYQ
COM004000
006.3
004.6
Q342
Kurzbeschreibung
The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, that is composed of three different volumes.
SWB-Titel-Idn
36768862X
Signatur
Springer E-Book
Bemerkungen
Elektronischer Volltext - Campuslizenz
Elektronische Adresse
$uhttp://dx.doi.org/10.1007/978-3-642-31513-8
Internetseite / Link
Volltext
Siehe auch
Inhaltsverzeichnis
Siehe auch
Inhaltstext
Siehe auch
Volltext
Siehe auch
Cover
.
ISBD-Anzeige
Katalogdatensatz500171670
.
Kategorien-Anzeige
Katalogdatensatz500171670
.
Verwandte Werke
Katalogdatensatz500171670
.
Titel zur Titelsammlung hinzufügen
Katalogdatensatz500171670
.
Kataloginformation500171670
Datensatzanfang
.
Kataloginformation500171670
Seitenanfang
.
Titel vormerken
Katalogdatensatz500171670
Vollanzeige Katalogdaten
Auf diesem Bildschirm erhalten Sie Katalog- und Exemplarinformationen zum ausgewählten Titel.
Im Bereich
Kataloginformation
werden die bibliographischen Details angezeigt. Per Klick auf Hyperlink-Begriffe wie Schlagwörter, Autoren, Reihen, Körperschaften und Klassifikationen können Sie sich weitere Titel des gewählten Begriffes anzeigen lassen.
Der Bereich
Exemplarinformationen
enthält zum einen Angaben über den Standort und die Verfügbarkeit der Exemplare. Zum anderen haben Sie die Möglichkeit, ausgeliehene Exemplare vorzumerken oder Exemplare aus dem Magazin zu bestellen.
Schnellsuche
Suche nach