Biometric-Based Physical and Cybersecurity Systems / / edited by Mohammad S. Obaidat, Issa Traore, Isaac Woungang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (590 pages) |
Disciplina | 006.4 |
Soggetto topico |
Signal processing
Image processing Speech processing systems Biometry System safety Computer security Signal, Image and Speech Processing Biometrics Security Science and Technology Systems and Data Security |
ISBN | 3-319-98734-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Part 1: Advances in Legacy Technologies -- Advances in Fingerprint Technology -- Recognition-based on Eye Biometrics Iris and Retina -- 3D Hand Geometry Recognition -- Fundamentals and Advances in 3D Face Recognition -- Part 2: Emerging Technologies -- Advances in Key Stroke Dynamics-based Security Schemes -- Behavioral Biometrics Based on Human-Computer Interaction Devices -- Continuous Authentication Using Writing Style -- Facets and Promises of Gait Biometrics Recognition -- Online Signature-based Biometrics Recognition -- EEG-based Biometrics -- Part 3: Hybrid Technologies -- Multimodal Biometrics Invariant Fusion Techniques -- Biometrics Based on Healthcare Sensors -- Biometric Authentication for Wearables -- Cognitive Biometrics for User Authentication -- Finger Knuckle based multi-biometrics authentication systems -- Part 4: Enabling Technologies -- Leveraging Cloud-based Resources for Automated Biometric Identification -- Automated Biometric Authentication with Cloud Computing -- Biometrics Security and Internet of Things -- Part 5: Technology and Society -- Protecting the Integrity of Elections using Biometrics -- Ethical, Legal, and Social Implications of Biometrics Technologies -- Conclusion. |
Record Nr. | UNINA-9910337652003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Business and Telecommunications [[electronic resource] ] : 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers / / edited by Mohammad S. Obaidat |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 277 p. 113 illus., 53 illus. in color.) |
Disciplina | 381.142 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer communication systems
Application software Computer security Coding theory Information theory Optical data processing Computer Communication Networks Information Systems Applications (incl. Internet) Systems and Data Security Coding and Information Theory Image Processing and Computer Vision |
ISBN | 3-030-52686-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Communication Networking -- e-Business -- Security and Cryptography -- Signal Processing and Multimedia Applications. |
Record Nr. | UNISA-996465349903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
E-Business and Telecommunications : 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers / / edited by Mohammad S. Obaidat |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 277 p. 113 illus., 53 illus. in color.) |
Disciplina | 381.142 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks
Application software Computer security Coding theory Information theory Optical data processing Computer Communication Networks Information Systems Applications (incl. Internet) Systems and Data Security Coding and Information Theory Image Processing and Computer Vision |
ISBN | 3-030-52686-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Communication Networking -- e-Business -- Security and Cryptography -- Signal Processing and Multimedia Applications. |
Record Nr. | UNINA-9910413444803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper / / edited by Mohammad S. Obaidat, Enrique Cabello |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XX, 371 p. 189 illus., 92 illus. in color.) |
Disciplina | 621.382 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer communication systems
Computer system failures Application software Computer networks - Security measures Computer security Coding theory Information theory Computer Communication Networks System Performance and Evaluation Information Systems Applications (incl. Internet) Mobile and Network Security Systems and Data Security Coding and Information Theory |
ISBN | 3-030-11039-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare. |
Record Nr. | UNINA-9910337579303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Business and Telecommunications : 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26–28, 2018, Revised Selected Papers / / edited by Mohammad S. Obaidat |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVII, 235 p. 134 illus., 59 illus. in color.) |
Disciplina | 621.382 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer communication systems
Computer security Application software Coding theory Information theory Computer system failures Computer Communication Networks Systems and Data Security Information Systems Applications (incl. Internet) Coding and Information Theory System Performance and Evaluation |
ISBN | 3-030-34866-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Optimal VNF Placement: Addressing Multiple Min-Cost Solutions -- Anonymity in Complex Transactions for e-Business -- Generation of High Quality Microwave Signal using Different Optoelectronic Techniques -- A Steganogaphic Scheme for MAC-Independent Opportunistic Routing & Encoding (MORE) Protocol -- Automated Verification of E-Commerce Protocols for Complex Transactions -- Intellectual Property Protection for Decentralized Deep Neural Networks -- Predicting CEO Misbehavior from Observables: Comparative Evaluation of Two Major Personality Models -- Compile-time Security Certification of Imperative Programming Languages -- Real-time Noise Reduction Algorithm for Video with Non-linear FIR Filter -- Cloudless Friend-to-Friend Middleware for Smartphones -- A Mixed Traffic Sharing and Resource Allocation for V2X Communication. |
Record Nr. | UNINA-9910357848703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Business and Telecommunications : 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers / / edited by Mohammad S. Obaidat |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXIII, 475 p. 186 illus.) |
Disciplina | 658.84 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer communication systems
Data protection Application software Special purpose computers E-commerce Computer security Computer Communication Networks Security Information Systems Applications (incl. Internet) Special Purpose and Application-Based Systems e-Commerce/e-business Systems and Data Security |
ISBN | 3-319-67876-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data communication networking -- E-business -- Optical communication systems -- Security and cryptography -- Signal processing and multimedia applications -- Wireless networks and mobile systems. |
Record Nr. | UNINA-9910254826603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Business and Telecommunications : 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papers / / edited by Mohammad S. Obaidat, Pascal Lorenz |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XXIII, 534 p. 178 illus. in color.) |
Disciplina | 621.382 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer communication systems
Computer security Application software Information storage and retrieval Computer Communication Networks Systems and Data Security Information Systems Applications (incl. Internet) Information Storage and Retrieval |
ISBN | 3-319-30222-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Invited Paper -- Integrating Retail and e-Commerce Using Web Analytics and Intelligent Sensors -- Abstract -- 1 Introduction -- 2 The Scene -- 3 Retail and E-Retail and Markets -- 4 User Scenarios and Transforming Technologies -- 5 Management/Administrator Needs and Requirements for Analytics and User profiles -- 6 Intelligence and Sensors -- 7 E-Commerce and Retail Shop Analytics Using Intelligent Sensors -- 8 User Profiles -- 9 Emotional Analysis -- 10 An Integrated Architecture -- 11 Conclusions -- References -- Data Communication Networking -- High Level Policies in SDN -- 1 Introduction -- 2 High Level SDN Architecture -- 2.1 Network and Hosts -- 2.2 SDN Control Plane -- 2.3 Sources of High Level Information -- 2.4 High Level SDN Controller and SDN Applications -- 3 High Level SDN Examples -- 3.1 Application-Aware Networks -- 3.2 Identity-Aware Networks -- 3.3 Other Traffic Identifiers and Combinations -- 4 Use Cases -- 4.1 Remote Intrusion Detection System -- 4.2 Packet Filter -- 4.3 Path Load Balancing -- 4.4 Traffic Monitoring -- 5 Testbeds -- 5.1 Application-Aware Testbed -- 5.2 Identity-Aware Testbed -- 6 Related Work -- 6.1 Application Awareness in SDN -- 6.2 Identity Awareness in SDN -- 7 Discussion -- 7.1 Evaluation -- 7.2 Typical Scenarios -- 8 Conclusion -- References -- What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility -- 1 Introduction -- 2 Transport Layer Security Protocol -- 2.1 Cipher Suites -- 2.2 OpenSSL -- 2.3 SSL/TLS Version Distribution and Vulnerabilities -- 2.4 Available Tools -- 3 Practical Evaluation -- 3.1 Methodology -- 3.2 Compatibility Estimation for ACH's Cipher Strings -- 3.3 OpenSSL Support for Various Cipher Suites -- 3.4 Analyzing Available Cipher Suites Using O-Saft -- 4 Cipher Suite Proposal.
5 Summary and Concluding Remarks -- 5.1 Comparing the Cipher Strings -- 5.2 Conclusion -- References -- e-Business -- ARM: Architecture for Recruitment Matchmaking -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Concept and Architecture -- 3.1 RDB (Relational Database) -- 3.2 Interface -- 3.3 Triple Store -- 3.4 Recommendation Engine -- 4 RS Algorithms -- 4.1 Entity Recommendations -- 4.2 Team Recommendations -- 5 Testing and Validation -- 5.1 Access Speed -- 5.2 Recommendation Speed -- 5.3 Precision -- 5.4 Validation Scenarios -- 5.5 ICE-B Feedback -- 6 Conclusions -- Acknowledgements -- References -- Understanding Local mGovernment Applications: A Business Model Approach to the Case of Brussels -- Abstract -- 1 Introduction -- 2 Business Models and M-Government -- 2.1 Business Model Thinking in mGov -- 2.2 mGov Business Model Parameters and Mapping Methodology -- 3 The Brussels Context -- 4 Official Brussels Apps -- 4.1 Be.Brussels -- 4.2 Brussels Gardens -- 4.3 City of Brussels -- 4.4 FixMyStreet Brussels -- 4.5 STIB Mobile -- 4.6 Visit Brussels -- 5 Mapping -- 6 Discussion -- 7 Conclusions -- Acknowledgements -- Annex -- References -- Understanding the Use of Location Sharing Services on Social Networking Platforms in China -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 The Adoption of Location-Based Services -- 2.2 Contextual Integrity -- 2.3 Privacy Concerns in Location Sharing Services -- 3 Research Questions -- 4 Method -- 5 Research Findings -- 5.1 Motivations to Use Location Sharing Services -- 5.2 Barriers to Use Location Sharing Services -- 5.3 The Information Norms of Sharing Location -- 5.3.1 Where Do People Check-in? -- 5.3.2 When Do People Check-in? -- 5.3.3 What Information Can Be Gained in Friends' Shared Location Information? -- 5.4 Applying Contextual Integrity to Analyze the Privacy Concern. 5.4.1 Potential Audiences -- 5.4.2 Violation of Appropriateness -- 5.4.3 Violation of Distribution -- 6 Conclusion and Future Work -- References -- Large Scale Evaluation of an Adaptive E-Advertising User Model -- Abstract -- 1 Introduction -- 2 Related Research -- 3 Authoring Adaptive E-Advertising -- 4 Scenario -- 4.1 Scenario 1 -- 4.2 Scenario 2 -- 5 Case Study -- 5.1 Hypotheses -- 5.2 Case Study Setup -- 5.3 Results -- 5.4 User Tracking -- 5.5 Participant Feedback -- 6 Discussion -- 7 Conclusions and Future Work -- References -- Optical Communication Systems -- How Do the Multiple Tunable Receivers Per Node Affect the Efficiency of a WDM LAN? A Performance Analytical Study -- Abstract -- 1 Introduction -- 2 Network Model and Assumptions -- 3 Analysis -- 4 Performance Evaluation -- 5 Propagation Delay Latency Modelling -- 6 Conclusion -- Appendix -- References -- Security and Cryptography -- A Scalable Honeynet Architecture for Industrial Control Systems -- 1 Introduction -- 2 Assumptions and Research Questions -- 3 Related Work -- 4 Approach -- 5 Architecture -- 5.1 Data Capture -- 5.2 Data Collection -- 5.3 Honeynet Management -- 5.4 Implementation -- 6 Experimental Evaluation -- 6.1 Results -- 6.2 Modbus --- Honeynet-Level Analysis -- 6.3 IEC-104 --- Honeynet-level Analysis -- 7 Conclusion -- References -- Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications -- 1 Introduction -- 2 Related Work -- 3 The Proposed Features -- 4 Evaluation: Study Design -- 5 Evaluation: Analysis of Data -- 5.1 Descriptive Statistics -- 5.2 Hypothesis Testing -- 5.3 Classification Analysis -- 6 Conclusions and Future Works -- References -- Automated Verification of e-Cash Protocols -- 1 Introduction -- 2 Modeling e-Cash Protocols in the Applied -Calculus -- 3 Formalizing Security Properties -- 3.1 Forgery-Related Properties. 3.2 Privacy Properties -- 4 Case Studies -- 4.1 Chaum Online Protocol -- 4.2 DigiCash Protocol -- 4.3 Chaum Offline Protocol -- 4.4 Protocol by Peterson and Poupard -- 5 Conclusion -- References -- Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity Approach -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Code Obfuscation Using Kolmogorov Complexity -- 4.1 Applying Kolmogorov Complexity to Code Obfuscation -- 4.2 Adversary Model -- 4.3 On the Impossibility of Obfuscation -- 4.4 Security and Unintelligibility -- 4.5 Normalized Kolmogorov Complexity -- 5 Individual Security of Code Obfuscation -- 6 Conclusion and Future Work -- References -- The Entity Labeling Pattern for Modeling Operating Systems Access Control -- 1 Introduction -- 2 Related Work -- 3 SELinux Access Control -- 3.1 Security Architecture -- 3.2 Policy Semantics -- 4 Modeling Patterns -- 4.1 Core-Based Modeling -- 4.2 Entity Labeling -- 5 SELinux Security Model -- 5.1 EL Components -- 5.2 Core-Based Model -- 5.3 Specifying SELX Commands -- 6 Model Instantiation -- 6.1 State Space -- 6.2 Model Extensions -- 6.3 Model Dynamics -- 6.4 Results -- 7 Conclusions -- References -- Execution Path Classification for Vulnerability Analysis and Detection -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Source Code Profiling for Exploit Detection -- 3.2 Risk -- 4 Design and Implementation -- 4.1 Entroine's Architecture and Workflow -- 4.2 Taxonomy of Dangerous Instructions -- 4.3 Classification and Ranking System -- 5 Experiments and Results -- 5.1 Entroine's Example Run -- 5.2 Experimental Results on the Juliet Test Case -- 6 Conclusions -- References -- A Privacy-Sensitive Collaborative Approach to Business Process Development -- 1 Introduction -- 2 Environment -- 3 Privacy Model -- 3.1 BP Execution Sequence -- 3.2 Differential Privacy. 3.3 Privacy Requirement -- 4 Proposed Approach -- 4.1 Differentially Private BP Execution Sequences -- 4.2 Process Mining and BP Workflow Generation -- 5 Analysis -- 6 Experimental Evaluation -- 6.1 Dataset Description -- 6.2 Results -- 7 Implementation -- 8 Related Work -- 9 Conclusions and Future Work -- References -- Using OWL Reasoning for Evaluating XACML Policies -- 1 Introduction -- 2 An OWL-Based XACML Policy Framework -- 3 Axiomatic Policies -- 3.1 Policy Archetypes -- 3.2 Combining Policies -- 3.3 Axiomatic Policies Generation Algorithm -- 3.4 Policy Decision -- 4 Performances -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Partial Key Exposure Attacks on RSA with Exponent Blinding -- 1 Introduction -- 2 Related Works -- 3 RSA Applications -- 3.1 RSA -- 3.2 CRT-RSA -- 3.3 Exponent Blinding -- 3.4 Common Parameters Setting -- 4 General Strategy -- 4.1 Lattices -- 4.2 General Strategy -- 5 Attacks on RSA -- 5.1 Partial Information on LSBs of d* -- 5.2 Partial Information on MSBs of d* -- 6 Attacks on CRT-RSA -- 6.1 Partial Information on LSBs of dp* -- 6.2 Partial Information on MSBs of dp* -- 7 Experimental Results -- 7.1 Results with Known LSBs of d* -- 7.2 Results with Known MSBs of d* -- 7.3 Results with Known LSBs of dp* -- 7.4 Results with Known MSBs of dp* -- 8 Conclusions -- References -- A Generalized Authentication Scheme for Mobile Phones Using Gait Signals -- 1 Introduction -- 2 Related Works -- 3 The Instability of Sensor Orientation -- 3.1 Problem Statement -- 3.2 Proposed Solution -- 4 Gait Recognition Model Construction -- 4.1 Data Preprocessing -- 4.2 Gait Pattern Extraction -- 4.3 Gait Model Construction -- 5 Experiments -- 5.1 Dataset Description -- 5.2 Experimental Configuration -- 5.3 Verification Results -- 5.4 Identification Results -- 5.5 The Impacts of Disorientation Error -- 6 Conclusions. References. |
Record Nr. | UNINA-9910254983303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Business and Telecommunications : 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers / / edited by Mohammad S. Obaidat, Andreas Holzinger, Joaquim Filipe |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XXIII, 538 p. 204 illus. in color.) |
Disciplina | 004.6 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer communication systems
Computer security Application software Information storage and retrieval Computer Communication Networks Systems and Data Security Information Systems Applications (incl. Internet) Information Storage and Retrieval |
ISBN | 3-319-25915-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data communication networking -- E-business -- Optical communication systems.-Security and cryptography -- Signal processing and multimedia applications.-Wireless information networks and systems. |
Record Nr. | UNINA-9910299258703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Business and Telecommunications : International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers / / edited by Mohammad S. Obaidat, Joaquim Filipe |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVII, 419 p. 189 illus.) |
Disciplina | 621.382 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer communication systems
Computer security Application software Information storage and retrieval Computer Communication Networks Systems and Data Security Information Systems Applications (incl. Internet) Information Storage and Retrieval |
ISBN | 3-662-44788-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data communication networking -- E-business -- Optical communication systems -- Security and cryptography -- Signal processing and multimedia applications -- Wireless information networks and systems. |
Record Nr. | UNINA-9910298988803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Business and Telecommunications : International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers / / edited by Mohammad S. Obaidat, Joaquim Filipe |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XIV, 303 p. 122 illus.) |
Disciplina | 004.6 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer communication systems
Computer security Application software Information storage and retrieval Computer Communication Networks Systems and Data Security Information Systems Applications (incl. Internet) Information Storage and Retrieval |
ISBN | 3-662-44791-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data communication networking.- E-business -- Optical communication systems.- Security and cryptography.- Wireless information systems -- Signal processing and multimedia. |
Record Nr. | UNINA-9910298988903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|