International Conference on Wireless, Intelligent, and Distributed Environment for Communication : WIDECOM 2018 / Isaac Woungang, Sanjay Kumar Dhurandher, editors.
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependabi...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Cham :
Springer,
[2018]
|
Series: | Lecture notes on data engineering and communication technologies ;
v. 18. |
Subjects: |
MARC
LEADER | 00000cam a2200000xi 4500 | ||
---|---|---|---|
001 | b10152590 | ||
003 | CoU | ||
005 | 20180619103742.2 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 180420s2018 sz a ob 101 0 eng d | ||
019 | |a 1034555423 |a 1038440231 | ||
020 | |a 9783319756264 |q (electronic bk.) | ||
020 | |a 3319756265 |q (electronic bk.) | ||
020 | |z 9783319756257 | ||
024 | 7 | |a 10.1007/978-3-319-75626-4 | |
035 | |a (OCoLC)spr1031847571 | ||
035 | |a (OCoLC)1031847571 |z (OCoLC)1034555423 |z (OCoLC)1038440231 | ||
037 | |a spr10.1007/978-3-319-75626-4 | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d GW5XE |d OCLCF |d EBLCP |d AZU |d UWO |d UPM | ||
049 | |a GWRE | ||
050 | 4 | |a TK5103.2 | |
111 | 2 | |a International Conference on Wireless, Intelligent, and Distributed Environment for Communication |d (2018 : |c New Delhi, India) | |
245 | 1 | 0 | |a International Conference on Wireless, Intelligent, and Distributed Environment for Communication : |b WIDECOM 2018 / |c Isaac Woungang, Sanjay Kumar Dhurandher, editors. |
264 | 1 | |a Cham : |b Springer, |c [2018] | |
264 | 4 | |c ©2018. | |
300 | |a 1 online resource : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |a text file |b PDF |2 rda. | ||
490 | 1 | |a Lecture notes on data engineering and communication technologies ; |v volume 18. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Intro; Preface; Acknowledgments; Contents; About the Authors; Tamper Detection Using Fragile Image Watermarking Based on Chaotic System; 1 Introduction; 2 Background; 2.1 Least Significant Bit: LSB Method; 2.2 Arnold Cat Map; 2.3 Logistics Maps; 3 Related Work; 4 Proposed Work; 4.1 Embedding Algorithm; 4.2 Extraction Algorithm; Experimental Result; Imperceptibility; Robustness; Comparative Analysis; 5 Conclusion; References; Cryptanalysis and Improvement of a User Authentication Scheme for SIP; 1 Introduction; 2 Preliminaries; 3 Review of Lu et al.'s Scheme; 3.1 Registration. | |
505 | 8 | |a 3.2 Mutual Authentication and Key Agreement3.3 Password Change Phase; 4 Weaknesses of Lu et al.'s Scheme; 4.1 Insider Attack; 4.2 User Anonymity; 5 Proposed Scheme; 5.1 Registration; 5.2 Mutual Authentication and Key Agreement; 5.3 Password Change Phase; 6 Mutual Authentication of Our Scheme Using BAN-Logic; 7 Security Analysis; 7.1 Anonymity; 7.2 Insider Attack; 7.3 Mutual Authentication; 7.4 Masquerade Attack; 7.5 Verifier Attack; 7.6 Perfect Forward Secrecy; 7.7 Replay Attack; 8 Performance Analysis; 8.1 Security Features; 8.2 Computational Cost; 9 Conclusion; References. | |
505 | 8 | |a Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques1 Introduction; 2 Related Surveys; 3 Existing Techniques; 4 Conclusion and Future Work; References; Securing Fuzzy Commitment Scheme Against Decodability Attack-Based Cross-Matching; 1 Introduction; 2 Fuzzy Commitment Scheme; 3 Cross-Matching Attacks; 3.1 Exhaustive Search Attack; 3.2 Decodability Attack; 4 Preventing Decodability Attack-Based Cross-Matching; 4.1 Case 1: Both Hash Value and Auxiliary Data Is Available; 4.2 Case 2: Only Auxiliary Data Is Available; 5 Conclusions and Future Work. | |
505 | 8 | |a Analysing, Designing, Implementation and Coding E-Commerce Through UX1 Introduction; 2 Vision and UX Scope; 3 *-6pt; 4 Methodology; 5 Results; 6 Conclusion; References; Performance Evaluation of GAER Over Various Crossover Techniques in Opportunistic Networks; 1 Introduction; 2 Related Work and Motivation; 3 Various Crossover Techniques; 3.1 One-Point Crossover; 3.2 Two-Point Crossover; 3.3 Uniform Crossover; 3.4 Random Permuting Crossover; 4 Tabular Illustration; 5 Simulation Setup; 6 Results and Analysis; 6.1 Performance Comparison at Different Number of Nodes. | |
520 | |a This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book’s structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems. | ||
588 | 0 | |a Online resource ; title from PDF title page (EBSCO, viewed April 23, 2018) | |
650 | 0 | |a Wireless communication systems |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008113541. | |
650 | 0 | |a Computer networks |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101222. | |
650 | 7 | |a Computer networks. |2 fast |0 (OCoLC)fst00872297. | |
650 | 7 | |a Wireless communication systems. |2 fast |0 (OCoLC)fst01176209. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772. | |
700 | 1 | |a Woungang, Isaac, |e editor. |0 http://id.loc.gov/authorities/names/nb2009003154 |1 http://isni.org/isni/0000000120291085. | |
700 | 1 | |a Dhurandher, Sanjay Kumar, |e editor. | |
776 | 0 | 8 | |i Printed edition: |z 9783319756257. |
830 | 0 | |a Lecture notes on data engineering and communication technologies ; |v v. 18. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-75626-4 |z Full Text (via Springer) |
907 | |a .b101525904 |b 03-19-20 |c 06-26-18 | ||
998 | |a web |b 07-11-18 |c g |d b |e - |f eng |g sz |h 0 |i 1 | ||
907 | |a .b101525904 |b 07-02-19 |c 06-26-18 | ||
944 | |a MARS - RDA ENRICHED | ||
907 | |a .b101525904 |b 07-11-18 |c 06-26-18 | ||
915 | |a I | ||
956 | |a Springer e-books | ||
956 | |b Springer Engineering eBooks 2018 English+International | ||
999 | f | f | |i 33f484d0-3bdc-5029-afed-1561cfd173c3 |s ca6a517c-bbbb-5526-9baa-aa8b0f75c33e |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e TK5103.2 |h Library of Congress classification |i Ebooks, Prospector |n 1 |