International Conference on Wireless, Intelligent, and Distributed Environment for Communication : WIDECOM 2018 / Isaac Woungang, Sanjay Kumar Dhurandher, editors.
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependabi...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Cham :
Springer,
[2018]
|
Series: | Lecture notes on data engineering and communication technologies ;
v. 18. |
Subjects: |
Table of Contents:
- Intro; Preface; Acknowledgments; Contents; About the Authors; Tamper Detection Using Fragile Image Watermarking Based on Chaotic System; 1 Introduction; 2 Background; 2.1 Least Significant Bit: LSB Method; 2.2 Arnold Cat Map; 2.3 Logistics Maps; 3 Related Work; 4 Proposed Work; 4.1 Embedding Algorithm; 4.2 Extraction Algorithm; Experimental Result; Imperceptibility; Robustness; Comparative Analysis; 5 Conclusion; References; Cryptanalysis and Improvement of a User Authentication Scheme for SIP; 1 Introduction; 2 Preliminaries; 3 Review of Lu et al.'s Scheme; 3.1 Registration.
- 3.2 Mutual Authentication and Key Agreement3.3 Password Change Phase; 4 Weaknesses of Lu et al.'s Scheme; 4.1 Insider Attack; 4.2 User Anonymity; 5 Proposed Scheme; 5.1 Registration; 5.2 Mutual Authentication and Key Agreement; 5.3 Password Change Phase; 6 Mutual Authentication of Our Scheme Using BAN-Logic; 7 Security Analysis; 7.1 Anonymity; 7.2 Insider Attack; 7.3 Mutual Authentication; 7.4 Masquerade Attack; 7.5 Verifier Attack; 7.6 Perfect Forward Secrecy; 7.7 Replay Attack; 8 Performance Analysis; 8.1 Security Features; 8.2 Computational Cost; 9 Conclusion; References.
- Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques1 Introduction; 2 Related Surveys; 3 Existing Techniques; 4 Conclusion and Future Work; References; Securing Fuzzy Commitment Scheme Against Decodability Attack-Based Cross-Matching; 1 Introduction; 2 Fuzzy Commitment Scheme; 3 Cross-Matching Attacks; 3.1 Exhaustive Search Attack; 3.2 Decodability Attack; 4 Preventing Decodability Attack-Based Cross-Matching; 4.1 Case 1: Both Hash Value and Auxiliary Data Is Available; 4.2 Case 2: Only Auxiliary Data Is Available; 5 Conclusions and Future Work.
- Analysing, Designing, Implementation and Coding E-Commerce Through UX1 Introduction; 2 Vision and UX Scope; 3 *-6pt; 4 Methodology; 5 Results; 6 Conclusion; References; Performance Evaluation of GAER Over Various Crossover Techniques in Opportunistic Networks; 1 Introduction; 2 Related Work and Motivation; 3 Various Crossover Techniques; 3.1 One-Point Crossover; 3.2 Two-Point Crossover; 3.3 Uniform Crossover; 3.4 Random Permuting Crossover; 4 Tabular Illustration; 5 Simulation Setup; 6 Results and Analysis; 6.1 Performance Comparison at Different Number of Nodes.