Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part I / / edited by Zhe Liu, Fan Wu, Sajal K. Das |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (653 pages) |
Disciplina | 621.384 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Application software Computer systems Artificial intelligence Computers, Special purpose Software engineering Computer Communication Networks Computer and Information Systems Applications Computer System Implementation Artificial Intelligence Special Purpose and Application-Based Systems Software Engineering |
ISBN | 3-030-85928-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Wireless Communications -- Blockchain -- Algorithms -- IoT and Edge Computing -- Scheduling & Optimization I. |
Record Nr. | UNISA-996464512303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 838 p. 332 illus., 257 illus. in color.) |
Disciplina | 621.384 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computers Data protection Computers, Special purpose Application software Computer Communication Networks Computing Milieux Data and Information Security Special Purpose and Application-Based Systems Computer and Information Systems Applications |
ISBN | 3-030-59016-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Full Papers -- Reinforcement Learning based Group Event Invitation Algorithm -- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness -- Maximizing The Expected In uence in Face of The Non-Progressive Adversary -- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain -- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System -- A Novel Blockchain Network Structure Based on Logical Nodes -- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks -- Learning-Aided Mobile Charging for Rechargeable Sensor Networks -- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications -- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing -- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union -- Approximation Algorithm for the Offloading Problem in Edge Computing -- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning -- Camera Style Guided Feature Generation for Person Re-Identification -- Sync or Fork: Node-Level Synchronization Analysis of Blockchain -- Multi-user Cooperative Computation Offloading in Mobile Edge Computing -- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER -- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System -- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation -- Multiset Synchronization with Counting Cuckoo Filters -- Privacy-Aware Online Task Offloading for Mobile-Edge Computing -- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition -- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks -- Optimizing Motion Estimation With an ReRAM-based PIM Architecture -- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM -- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning -- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT -- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks -- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks -- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction -- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation -- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data -- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game -- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks -- An improved parallel network tra c anomaly detection method based on Bagging and GRU -- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs -- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing -- A Survey: Applications of Blockchains in the Internet of Vehicles -- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography -- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage -- A New Fully Homomorphic Signatures from Standard Lattices -- An Efficient Malicious User Detection Mechanism for Crowdsensing System -- Implementation of Video Transmission over Maritime Ad Hoc Network -- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing -- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme -- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs -- Consensus in Wireless Blockchain System -- Blockchain-based Service Recommendation Supporting Data Sharing -- Multi-objective disaster backup in inter-datacenter using reinforcement learning -- Detecting Internet-scale NATs for IoT Devices Based on Tri-net -- Data integrity checking supporting reliable data migration in cloud storage -- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks -- A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing -- A DUAL SCALE MATCHING MODEL FOR LONG-TERM ASSOCIATION -- A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2 -- SEM: App Usage Prediction with Session-based Embedding -- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning -- A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries -- Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation -- GaitID: Robust Wi-Fi Based Gait Recognition -- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network -- EdgeCC: An authentication framework for the fast migration of edge services under mobile clients -- Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation -- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation -- An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments -- HotDAG: Hybrid Consensus via Sharding in the Permissionless Model -- Distributed Data Aggregation in Dynamic Sensor Networks. |
Record Nr. | UNISA-996418312703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part II / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 134 p. 57 illus., 45 illus. in color.) |
Disciplina | 004.6 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computers Data protection Computers, Special purpose Application software Computer Communication Networks Computing Milieux Data and Information Security Special Purpose and Application-Based Systems Computer and Information Systems Applications |
ISBN | 3-030-59019-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Short Papers -- Cluster-based Routine Basic Safety Message dissemination in VANETs -- On-Road Vehicle Detection Algorithm Based on Mathematical Morphology -- Estimation of Short-term Online Taxi Travel Time Based on Neural Network -- Research on Algorithms for Finding Top-k Nodes in Campus Collaborative Learning Community under Mobile Social Network -- VES: A Component Version Extracting System for Large-Scale IoT Firmwares -- Virtual Location Generation for Location Privacy Protection in VANET -- Reliable Visible Light-Based Underground Positioning Algorithm Utilizing a New Mechanism: Reverse Transceiver Position -- Research on 5G Internet of Vehicles Facilities based on Coherent Beamforming -- LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs -- Joint Switch Upgrade and VNF Placement for NFV-Based SDNs -- The Throughput Optimization for Multi-hop MIMO Networks Based on Joint IA and SIC -- A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems 100 -- C-DAG: Community-assisted DAG Mechanism with High throughput and Eventual Consistency -- Non-pre-trained Mine Pedestrian Detection Based on Automatic Generation of Anchor box. . |
Record Nr. | UNISA-996418320003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part II / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 134 p. 57 illus., 45 illus. in color.) |
Disciplina | 004.6 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computers Data protection Computers, Special purpose Application software Computer Communication Networks Computing Milieux Data and Information Security Special Purpose and Application-Based Systems Computer and Information Systems Applications |
ISBN | 3-030-59019-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Short Papers -- Cluster-based Routine Basic Safety Message dissemination in VANETs -- On-Road Vehicle Detection Algorithm Based on Mathematical Morphology -- Estimation of Short-term Online Taxi Travel Time Based on Neural Network -- Research on Algorithms for Finding Top-k Nodes in Campus Collaborative Learning Community under Mobile Social Network -- VES: A Component Version Extracting System for Large-Scale IoT Firmwares -- Virtual Location Generation for Location Privacy Protection in VANET -- Reliable Visible Light-Based Underground Positioning Algorithm Utilizing a New Mechanism: Reverse Transceiver Position -- Research on 5G Internet of Vehicles Facilities based on Coherent Beamforming -- LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs -- Joint Switch Upgrade and VNF Placement for NFV-Based SDNs -- The Throughput Optimization for Multi-hop MIMO Networks Based on Joint IA and SIC -- A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems 100 -- C-DAG: Community-assisted DAG Mechanism with High throughput and Eventual Consistency -- Non-pre-trained Mine Pedestrian Detection Based on Automatic Generation of Anchor box. . |
Record Nr. | UNINA-9910427716603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 838 p. 332 illus., 257 illus. in color.) |
Disciplina | 621.384 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computers Data protection Computers, Special purpose Application software Computer Communication Networks Computing Milieux Data and Information Security Special Purpose and Application-Based Systems Computer and Information Systems Applications |
ISBN | 3-030-59016-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Full Papers -- Reinforcement Learning based Group Event Invitation Algorithm -- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness -- Maximizing The Expected In uence in Face of The Non-Progressive Adversary -- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain -- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System -- A Novel Blockchain Network Structure Based on Logical Nodes -- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks -- Learning-Aided Mobile Charging for Rechargeable Sensor Networks -- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications -- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing -- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union -- Approximation Algorithm for the Offloading Problem in Edge Computing -- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning -- Camera Style Guided Feature Generation for Person Re-Identification -- Sync or Fork: Node-Level Synchronization Analysis of Blockchain -- Multi-user Cooperative Computation Offloading in Mobile Edge Computing -- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER -- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System -- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation -- Multiset Synchronization with Counting Cuckoo Filters -- Privacy-Aware Online Task Offloading for Mobile-Edge Computing -- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition -- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks -- Optimizing Motion Estimation With an ReRAM-based PIM Architecture -- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM -- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning -- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT -- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks -- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks -- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction -- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation -- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data -- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game -- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks -- An improved parallel network tra c anomaly detection method based on Bagging and GRU -- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs -- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing -- A Survey: Applications of Blockchains in the Internet of Vehicles -- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography -- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage -- A New Fully Homomorphic Signatures from Standard Lattices -- An Efficient Malicious User Detection Mechanism for Crowdsensing System -- Implementation of Video Transmission over Maritime Ad Hoc Network -- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing -- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme -- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs -- Consensus in Wireless Blockchain System -- Blockchain-based Service Recommendation Supporting Data Sharing -- Multi-objective disaster backup in inter-datacenter using reinforcement learning -- Detecting Internet-scale NATs for IoT Devices Based on Tri-net -- Data integrity checking supporting reliable data migration in cloud storage -- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks -- A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing -- A DUAL SCALE MATCHING MODEL FOR LONG-TERM ASSOCIATION -- A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2 -- SEM: App Usage Prediction with Session-based Embedding -- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning -- A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries -- Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation -- GaitID: Robust Wi-Fi Based Gait Recognition -- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network -- EdgeCC: An authentication framework for the fast migration of edge services under mobile clients -- Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation -- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation -- An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments -- HotDAG: Hybrid Consensus via Sharding in the Permissionless Model -- Distributed Data Aggregation in Dynamic Sensor Networks. |
Record Nr. | UNINA-9910427716703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings / / edited by Sriram Chellappan, Wei Cheng, Wei Li |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVIII, 910 p. 398 illus.) |
Disciplina | 621.382 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Computer networks Application software Data protection Artificial intelligence Computer Communication Networks Computer and Information Systems Applications Data and Information Security Artificial Intelligence |
ISBN | 3-319-94268-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hypergraph Based Radio Resource Management in 5G Fog Cell -- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism -- Interest-aware next POI Recommendation for Mobile Social Networks -- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs -- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval -- An Open Security-enhanced Compatible OpenFlow Platform -- Hop-constrained Relay Node Placement in Wireless Sensor Networks -- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection -- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications -- Delay-constraint Throughput Maximization in UAV-assisted VANETs -- Smart Device Fingerprinting based on Webpage Loading -- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain -- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality -- An Efficient Privacy-Preserving Data Aggregation Scheme for IoT -- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET -- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder -- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System -- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation -- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data -- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data -- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks -- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model -- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments -- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques -- Massive MIMO Power Allocation in Millimeter Wave Networks -- A detection-resistant covert timing channel based on Geometric Huffman Coding -- Spark: A Smart Parking Lot Monitoring System -- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection -- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users -- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning -- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation -- Household Electrical Load Scheduling Algorithms with Renewable Energy -- An Empirical Study of OAuth-based SSO System on Web -- Turning Legacy IR Devices into Smart IoT Devices -- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy -- Data Uploading Mechanism for Internet of Things with Energy Harvesting -- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference -- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines -- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination -- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks -- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks -- Privacy-preserving Personal Sensitive Data in Crowdsourcing -- A First Step Towards Combating Fake News Over Online Social Media -- Predicting Smartphone App Usage with Recurrent Neural Networks -- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games -- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network -- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks -- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings -- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing -- HEVC Lossless Compression Coding based on Hadamard Buttery Transformation -- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks -- Localization of Thyroid Nodules in Ultrasonic Images -- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices -- An Information Classification Collection Protocol for Large-scale RFID Systems -- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks -- On Association Study of Scalp EEG Data Channels Under Different Circumstances -- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain -- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network -- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query -- KrackCover: A Wireless Security Framework for Covering KRACK Attacks -- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network -- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information -- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays -- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks -- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing -- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET -- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way -- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems -- A Novel Capability-Aware SIC-based Protocol for Wireless Networks -- A Supervised Learning Approach to Link Prediction in Dynamic Networks -- Mining Mobile Users' Interests through Cellular Network Browsing Profiles -- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System -- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers -- Network Control for Large-Scale Container Clusters -- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks -- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals -- A Recognition Approach for the Groups with Interactions -- Security Enhancement of Over-the-Air Update for Connected Vehicles -- Resilient SDN-based Communication in Vehicular Network -- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check -- Understanding Data Breach: A Visualization Aspect -- A Novel Recommendation-based Trust Inference Model for MANETs. |
Record Nr. | UNISA-996465693203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings / / edited by Sriram Chellappan, Wei Cheng, Wei Li |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVIII, 910 p. 398 illus.) |
Disciplina | 621.382 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Computer networks Application software Data protection Artificial intelligence Computer Communication Networks Computer and Information Systems Applications Data and Information Security Artificial Intelligence |
ISBN | 3-319-94268-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hypergraph Based Radio Resource Management in 5G Fog Cell -- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism -- Interest-aware next POI Recommendation for Mobile Social Networks -- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs -- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval -- An Open Security-enhanced Compatible OpenFlow Platform -- Hop-constrained Relay Node Placement in Wireless Sensor Networks -- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection -- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications -- Delay-constraint Throughput Maximization in UAV-assisted VANETs -- Smart Device Fingerprinting based on Webpage Loading -- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain -- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality -- An Efficient Privacy-Preserving Data Aggregation Scheme for IoT -- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET -- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder -- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System -- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation -- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data -- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data -- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks -- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model -- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments -- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques -- Massive MIMO Power Allocation in Millimeter Wave Networks -- A detection-resistant covert timing channel based on Geometric Huffman Coding -- Spark: A Smart Parking Lot Monitoring System -- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection -- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users -- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning -- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation -- Household Electrical Load Scheduling Algorithms with Renewable Energy -- An Empirical Study of OAuth-based SSO System on Web -- Turning Legacy IR Devices into Smart IoT Devices -- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy -- Data Uploading Mechanism for Internet of Things with Energy Harvesting -- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference -- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines -- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination -- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks -- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks -- Privacy-preserving Personal Sensitive Data in Crowdsourcing -- A First Step Towards Combating Fake News Over Online Social Media -- Predicting Smartphone App Usage with Recurrent Neural Networks -- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games -- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network -- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks -- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings -- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing -- HEVC Lossless Compression Coding based on Hadamard Buttery Transformation -- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks -- Localization of Thyroid Nodules in Ultrasonic Images -- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices -- An Information Classification Collection Protocol for Large-scale RFID Systems -- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks -- On Association Study of Scalp EEG Data Channels Under Different Circumstances -- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain -- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network -- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query -- KrackCover: A Wireless Security Framework for Covering KRACK Attacks -- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network -- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information -- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays -- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks -- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing -- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET -- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way -- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems -- A Novel Capability-Aware SIC-based Protocol for Wireless Networks -- A Supervised Learning Approach to Link Prediction in Dynamic Networks -- Mining Mobile Users' Interests through Cellular Network Browsing Profiles -- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System -- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers -- Network Control for Large-Scale Container Clusters -- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks -- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals -- A Recognition Approach for the Groups with Interactions -- Security Enhancement of Over-the-Air Update for Connected Vehicles -- Resilient SDN-based Communication in Vehicular Network -- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check -- Understanding Data Breach: A Visualization Aspect -- A Novel Recommendation-based Trust Inference Model for MANETs. |
Record Nr. | UNINA-9910349432103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings / / edited by Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVII, 912 p. 405 illus.) |
Disciplina | 621.382 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Computer networks Application software Electronic digital computers—Evaluation Electronic data processing—Management Computer Communication Networks Computer and Information Systems Applications System Performance and Evaluation IT Operations |
ISBN | 3-319-60033-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cognitive radio networks -- Wireless sensor networks -- Cyber-physical systems -- Distributed and localized algorithm design and analysis -- Information and coding theory for wireless networks -- Localization -- Mobile cloud computing -- Topology control and coverage -- Security and privacy -- Underwater and underground networks -- Vehicular networks -- Internet of things -- Information processing and data management -- Programmable service interfaces -- Energy-efficient algorithms -- System and protocol design -- Operating system and middle-ware support -- Experimental test-beds, models and case studies. |
Record Nr. | UNISA-996466285803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings / / edited by Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVII, 912 p. 405 illus.) |
Disciplina | 621.382 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Computer networks Application software Electronic digital computers—Evaluation Electronic data processing—Management Computer Communication Networks Computer and Information Systems Applications System Performance and Evaluation IT Operations |
ISBN | 3-319-60033-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cognitive radio networks -- Wireless sensor networks -- Cyber-physical systems -- Distributed and localized algorithm design and analysis -- Information and coding theory for wireless networks -- Localization -- Mobile cloud computing -- Topology control and coverage -- Security and privacy -- Underwater and underground networks -- Vehicular networks -- Internet of things -- Information processing and data management -- Programmable service interfaces -- Energy-efficient algorithms -- System and protocol design -- Operating system and middle-ware support -- Experimental test-beds, models and case studies. |
Record Nr. | UNINA-9910483056603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XV, 583 p. 260 illus.) |
Disciplina | 621.3821 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Computer networks Application software Electronic digital computers—Evaluation Electronic data processing—Management Computer Communication Networks Computer and Information Systems Applications System Performance and Evaluation IT Operations |
ISBN | 3-319-42836-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems -- 1 Introduction -- 2 Related Works and Preliminary -- 2.1 Related Works -- 2.2 Preliminary -- 3 RSGA -- 3.1 Motivations and Basic Idea -- 3.2 Definitions and Assumptions -- 3.3 The Proposed Authentication Protocol -- 4 Analyses -- 4.1 Anonymity Analysis -- 4.2 Cost Analysis -- 5 Simulation -- 5.1 Simulation Configuration -- 5.2 Simulation Results -- 6 Conclusion -- References -- Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles -- 1 Introduction -- 2 Related Work -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Divide Audio Clips into Segments -- 3.3 Segment-Level Feature Extraction -- 3.4 Divide Segments into Frames -- 3.5 Frame-Level Feature Extraction -- 3.6 Multiple Frames Accumulation -- 3.7 Dimension Reduction -- 4 Evaluation -- 4.1 Recognition Performance of Different Recognizers -- 4.2 Experimental Results -- 4.3 Time Consumption of Every Computational Step -- 5 Conclusion -- References -- A New Paradigm for Shortest Link Scheduling in Wireless Networks: Theory and Applications -- 1 Introduction -- 2 Weak Duality -- 3 An Adaptive Zero-Sum Game with Retirement -- 4 Approximation Algorithm for SLS -- 5 Applications -- 5.1 Wireless SCSR Networks Under Physical Interference Model -- 5.2 Wireless MCMR Networks Under Protocol Interference Model -- 5.3 Wireless MIMO Networks Under Protocol Interference Model -- 6 Conclusion -- References -- CO2: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs -- 1 Introduction -- 2 Problem Statement -- 3 CO2: Relay Node Placement Strategy -- 4 Performance Evaluation -- 4.1 Experimental Settings -- 4.2 Experimental Results -- 5 Conclusion -- References.
CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid -- 1 Introduction -- 2 Colluded NTL Fraud -- 2.1 Problem Definition and Attack Model -- 3 CNTL Fraud Detection -- 3.1 Observer Meter -- 3.2 Tampered Meter Detection -- 3.3 Adversary Differentiation -- 4 Experiments -- 5 Related Work -- 6 Conclusion -- References -- SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Social-Aware Utility -- 3.2 Consumptions in SUO Services -- 4 Optimal Solution -- 5 Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusions -- References -- Piggybacking Lightweight Control Messages on Physical Layer for Multicarrier Wireless LANs -- 1 Introduction -- 2 Overview of PhyPig -- 3 Feasibility of PhyPig -- 3.1 Frequency Selective Fading -- 3.2 Symbol Error Pattern -- 3.3 Extra Coding Redundancy -- 4 PhyPig Design -- 4.1 Overall System Architecture -- 4.2 Modulation/Demodulation of Control Messages -- 4.3 Rate Selection of Control Messages -- 5 Evaluation -- 5.1 Accuracy of PhyPig Detection -- 5.2 Rate of Control Messages -- 5.3 Applications of PhyPig -- 6 Conclusion -- References -- Multi-focus Image Fusion via Region Mosaicing on Contrast Pyramids -- Abstract -- 1 Introduction -- 2 Focus Region Segmentation -- 2.1 Pixel Level Focus Measurement -- 2.2 Focus Region Segmentation -- 3 Region Mosaicing on Contrast Pyramids -- 3.1 Contrast Pyramid Fusion -- 3.2 Region Based Contrast Pyramid Fusion -- 4 Experiments -- 5 Conclusions -- Acknowledgement -- References -- Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks -- 1 Introduction -- 2 Algorithm Development -- 2.1 Brief Review of ADMM -- 2.2 Distributed Constrained Optimization -- 3 Implementation Issues -- 3.1 Algorithm Outline. 3.2 Early Termination of Inner Loops -- 3.3 Comparisons with Existing Works -- 4 Numerical Experiments -- 5 Conclusions -- References -- Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Probabilistic Path Inference Model -- 3.1 Problem Definition -- 3.2 Unified Inference Model -- 4 Collaborative Tensor Filter -- 4.1 Tensor Construction -- 4.2 Tensor Decomposition with Regularization -- 4.3 Dynamic Feature Extraction -- 4.4 System Framework -- 5 Experiments -- 5.1 Settings -- 5.2 Evaluation Approach -- 5.3 Results -- 6 Conclusion -- References -- NFC Secure Payment and Verification Scheme for Mobile Payment -- Abstract -- 1 Introduction -- 2 NFC Mobile Electronic Ticket System -- 2.1 Scheme Structure -- 2.2 CS E-Ticket -- 2.3 CS E-Ticket NFC Payment Scheme -- 2.4 Offline CS E-Ticket Secure Verification -- 3 Security Analysis of NFC Mobile Electronic Ticket System -- 3.1 Security Analysis -- 3.2 Practicability Analysis -- 4 Conclusions -- Acknowledgment -- References -- Multi-path Reliable Routing with Pipeline Schedule in Wireless Sensor Networks -- 1 Introduction -- 2 Protocol Design -- 2.1 Establish Conversion Relationship Between Multi-paths -- 2.2 Conversion Between Multi-paths and Pipeline -- 3 The Selection of Scheduling Time in Assemble Line -- 3.1 Pipeline State's Classification -- 3.2 Prediction Algorithm Based on Markov Chain -- 4 Experiment and Analysis -- 4.1 The Impact of Sampling Period -- 4.2 The Impact of the Number of Pipeline Segment -- 4.3 The Impact of Predicting Time -- 5 Conclusion -- References -- A QoE-Aware Adaptive Spectrum Allocation Framework for Secondary Mobile Networks -- 1 Introduction -- 2 Adaptive Framework for Spectrum Allocation in Secondary Mobile Network -- 2.1 Service Model -- 2.2 Adaptive Spectrum Allocation Strategies. 3 Determining System Performance -- 4 Numerical Results -- 5 Conclusion and Future Directions -- References -- Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks -- 1 Introduction -- 2 Network Model and Problem Statement -- 2.1 Network Model -- 2.2 Block Error Rate -- 2.3 Decoding Requirement -- 2.4 Bound for Broadcast Traffic -- 2.5 Objective Function -- 2.6 Approximation of Primal Optimization Problem -- 3 Distributed Algorithm Design -- 4 Performance Evaluation -- 4.1 Influence of Different Link Conditions -- 4.2 Influence of Weight on Traffic Allocation -- 5 Conclusion -- References -- Identifying Discrepant Tags in RFID-enabled Supply Chains -- 1 Introduction -- 2 Problem Formulation -- 3 Deterministic Identification Protocol -- 4 Probabilistic Identification Protocol with Estimation -- 5 Evaluation -- 5.1 Experimental Comparison -- 6 Related Work -- 7 Concluding Remarks -- Appendix: -- References -- SHMDRS: A Smartphone-Based Human Motion Detection and Response System -- 1 Introduction -- 2 Overview of the System -- 3 The Human Motion Detection Module -- 3.1 Software Architecture -- 3.2 Data Acquisition and Collection -- 3.3 Data Processing and Machine Learning -- 3.4 Light-Kernel and Server-Free Design -- 4 The Response and Controller Module -- 5 The Location Retrieving Module -- 6 Experimental Results -- 7 Related Works -- 8 Conclusion -- References -- iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running -- 1 Introduction -- 2 Background -- 3 Data Collection -- 4 System Design -- 4.1 Preprocess -- 4.2 Segmentation -- 4.3 Feature Extraction -- 4.4 Detect Warm-Up Phase -- 5 Evaluation -- 5.1 Slide Window Size -- 5.2 Proper Multi-class Classifier -- 6 Related Work -- 7 Conclusion -- References -- iBeaconing: A Low-Cost, Wireless Student Protection System -- 1 Introduction. 2 Related Work -- 3 Overall System Design -- 3.1 Beacon Scanning -- 3.2 Alert Data Transmission -- 4 System Components -- 4.1 The Bluetooth Scanners -- 4.2 The Central Webserver and Database -- 4.3 The Smartphone Application -- 5 Implementation -- 5.1 Installation -- 5.2 Cost -- 5.3 Evaluation -- 6 Conclusion -- References -- The Power Control Strategy for Mine Locomotive Wireless Network Based on Successive Interference Cancellation -- 1 Introduction -- 2 Mine Locomotive Wireless Networks -- 2.1 Network Model -- 2.2 Problem Formulation -- 2.3 Reformulation -- 3 Polynomial-Time Algorithm -- 4 Simulation Results -- 4.1 Results for a Wireless Network with 20 Locomotives -- 4.2 Results for All Network Instances -- 5 Conclusions -- References -- ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 An Efficient and Secure Relay Selection Algorithm -- 4.1 Payoff Functions -- 4.2 Relay Selection Based on the Network Formation Game -- 4.3 Stability Analysis -- 5 Simulation -- 5.1 Simulation Study Using the Synthetic Trace -- 5.2 Simulation Study Using the Real-World Trace -- 6 Conclusion -- References -- Energy Detection of Gaussian Signals Subject to Impulsive Noise in Generalized Fading Channels -- 1 Introduction -- 2 The Energy Detector -- 2.1 Hypothesis H0 -- 2.2 Hypothesis H1 -- 3 Generalized Fading Channels -- 3.1 The - Distribution -- 3.2 The - Distribution -- 3.3 The - Distribution -- 4 Numerical Analysis -- 4.1 Cooperative Sensing -- 5 Conclusion -- Appendix A -- References -- Distance Bounding Protocol for RFID Systems -- 1 Introduction -- 2 The SMDB Protocol -- 2.1 Slow Exchange Phase -- 2.2 Rapid Bit Exchange Phase -- 2.3 Verification Phase -- 2.4 Identifier Update Phase -- 3 Security Analysis of the SMDB Protocol. 3.1 Analysis on Impersonation Attacks. |
Record Nr. | UNISA-996466058703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|