LEADER 05910nam 22007695 450 001 9910337579303321 005 20200703194314.0 010 $a3-030-11039-7 024 7 $a10.1007/978-3-030-11039-0 035 $a(CKB)4100000007522476 035 $a(DE-He213)978-3-030-11039-0 035 $a(MiAaPQ)EBC5923458 035 $a(PPN)233800166 035 $a(EXLCZ)994100000007522476 100 $a20190117d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aE-Business and Telecommunications $e14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper /$fedited by Mohammad S. Obaidat, Enrique Cabello 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XX, 371 p. 189 illus., 92 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v990 311 $a3-030-11038-9 320 $aIncludes bibliographical references and index. 327 $aClient Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare. 330 $aThis book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems. 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v990 606 $aComputer communication systems 606 $aComputer system failures 606 $aApplication software 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 615 0$aComputer communication systems. 615 0$aComputer system failures. 615 0$aApplication software. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aComputer Communication Networks. 615 24$aSystem Performance and Evaluation. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aMobile and Network Security. 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 676 $a621.382 676 $a621.382 702 $aObaidat$b Mohammad S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCabello$b Enrique$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337579303321 996 $aE-Business and Telecommunications$91961627 997 $aUNINA