Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
EBOOK
Conference International Conference on Wireless, Intelligent, and Distributed Environment for Communication (2018 : New Delhi, India)
Title International Conference on Wireless, Intelligent, and Distributed Environment for Communication : WIDECOM 2018 / Isaac Woungang, Sanjay Kumar Dhurandher, editors.
Imprint Cham : Springer, [2018]
2018

LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
Conference International Conference on Wireless, Intelligent, and Distributed Environment for Communication (2018 : New Delhi, India)
Series Lecture notes on data engineering and communication technologies ; volume 18
Lecture notes on data engineering and communication technologies ; v. 18.
Subject Wireless communication systems -- Congresses.
Computer networks -- Congresses.
Alt Name Woungang, Isaac,
Dhurandher, Sanjay Kumar,
Description 1 online resource : illustrations.
polychrome rdacc
Bibliography Note Includes bibliographical references and index.
Contents Intro; Preface; Acknowledgments; Contents; About the Authors; Tamper Detection Using Fragile Image Watermarking Based on Chaotic System; 1 Introduction; 2 Background; 2.1 Least Significant Bit: LSB Method; 2.2 Arnold Cat Map; 2.3 Logistics Maps; 3 Related Work; 4 Proposed Work; 4.1 Embedding Algorithm; 4.2 Extraction Algorithm; Experimental Result; Imperceptibility; Robustness; Comparative Analysis; 5 Conclusion; References; Cryptanalysis and Improvement of a User Authentication Scheme for SIP; 1 Introduction; 2 Preliminaries; 3 Review of Lu et al.'s Scheme; 3.1 Registration.
3.2 Mutual Authentication and Key Agreement3.3 Password Change Phase; 4 Weaknesses of Lu et al.'s Scheme; 4.1 Insider Attack; 4.2 User Anonymity; 5 Proposed Scheme; 5.1 Registration; 5.2 Mutual Authentication and Key Agreement; 5.3 Password Change Phase; 6 Mutual Authentication of Our Scheme Using BAN-Logic; 7 Security Analysis; 7.1 Anonymity; 7.2 Insider Attack; 7.3 Mutual Authentication; 7.4 Masquerade Attack; 7.5 Verifier Attack; 7.6 Perfect Forward Secrecy; 7.7 Replay Attack; 8 Performance Analysis; 8.1 Security Features; 8.2 Computational Cost; 9 Conclusion; References.
Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques1 Introduction; 2 Related Surveys; 3 Existing Techniques; 4 Conclusion and Future Work; References; Securing Fuzzy Commitment Scheme Against Decodability Attack-Based Cross-Matching; 1 Introduction; 2 Fuzzy Commitment Scheme; 3 Cross-Matching Attacks; 3.1 Exhaustive Search Attack; 3.2 Decodability Attack; 4 Preventing Decodability Attack-Based Cross-Matching; 4.1 Case 1: Both Hash Value and Auxiliary Data Is Available; 4.2 Case 2: Only Auxiliary Data Is Available; 5 Conclusions and Future Work.
Analysing, Designing, Implementation and Coding E-Commerce Through UX1 Introduction; 2 Vision and UX Scope; 3 *-6pt; 4 Methodology; 5 Results; 6 Conclusion; References; Performance Evaluation of GAER Over Various Crossover Techniques in Opportunistic Networks; 1 Introduction; 2 Related Work and Motivation; 3 Various Crossover Techniques; 3.1 One-Point Crossover; 3.2 Two-Point Crossover; 3.3 Uniform Crossover; 3.4 Random Permuting Crossover; 4 Tabular Illustration; 5 Simulation Setup; 6 Results and Analysis; 6.1 Performance Comparison at Different Number of Nodes.
Summary This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.
Note Online resource; title from PDF title page (EBSCO, viewed April 23, 2018).
ISBN 9783319756264 (electronic bk.)
3319756265 (electronic bk.)
9783319756257
3319756257
9783319756257
ISBN/ISSN 10.1007/978-3-319-75626-4
OCLC # 1031847571
Additional Format Printed edition: 9783319756257


If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team