top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Biometric-Based Physical and Cybersecurity Systems / / edited by Mohammad S. Obaidat, Issa Traore, Isaac Woungang
Biometric-Based Physical and Cybersecurity Systems / / edited by Mohammad S. Obaidat, Issa Traore, Isaac Woungang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (590 pages)
Disciplina 006.4
Soggetto topico Signal processing
Image processing
Speech processing systems
Biometrics (Biology)
System safety
Computer security
Signal, Image and Speech Processing
Biometrics
Security Science and Technology
Systems and Data Security
ISBN 3-319-98734-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Part 1: Advances in Legacy Technologies -- Advances in Fingerprint Technology -- Recognition-based on Eye Biometrics Iris and Retina -- 3D Hand Geometry Recognition -- Fundamentals and Advances in 3D Face Recognition -- Part 2: Emerging Technologies -- Advances in Key Stroke Dynamics-based Security Schemes -- Behavioral Biometrics Based on Human-Computer Interaction Devices -- Continuous Authentication Using Writing Style -- Facets and Promises of Gait Biometrics Recognition -- Online Signature-based Biometrics Recognition -- EEG-based Biometrics -- Part 3: Hybrid Technologies -- Multimodal Biometrics Invariant Fusion Techniques -- Biometrics Based on Healthcare Sensors -- Biometric Authentication for Wearables -- Cognitive Biometrics for User Authentication -- Finger Knuckle based multi-biometrics authentication systems -- Part 4: Enabling Technologies -- Leveraging Cloud-based Resources for Automated Biometric Identification -- Automated Biometric Authentication with Cloud Computing -- Biometrics Security and Internet of Things -- Part 5: Technology and Society -- Protecting the Integrity of Elections using Biometrics -- Ethical, Legal, and Social Implications of Biometrics Technologies -- Conclusion.
Record Nr. UNINA-9910337652003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Business and Telecommunications [[electronic resource] ] : 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers / / edited by Mohammad S. Obaidat
E-Business and Telecommunications [[electronic resource] ] : 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers / / edited by Mohammad S. Obaidat
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 277 p. 113 illus., 53 illus. in color.)
Disciplina 381.142
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Application software
Computer security
Coding theory
Information theory
Optical data processing
Computer Communication Networks
Information Systems Applications (incl. Internet)
Systems and Data Security
Coding and Information Theory
Image Processing and Computer Vision
ISBN 3-030-52686-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Communication Networking -- e-Business -- Security and Cryptography -- Signal Processing and Multimedia Applications.
Record Nr. UNISA-996465349903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
E-Business and Telecommunications : 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers / / edited by Mohammad S. Obaidat
E-Business and Telecommunications : 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers / / edited by Mohammad S. Obaidat
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 277 p. 113 illus., 53 illus. in color.)
Disciplina 381.142
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Application software
Computer security
Coding theory
Information theory
Optical data processing
Computer Communication Networks
Information Systems Applications (incl. Internet)
Systems and Data Security
Coding and Information Theory
Image Processing and Computer Vision
ISBN 3-030-52686-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Communication Networking -- e-Business -- Security and Cryptography -- Signal Processing and Multimedia Applications.
Record Nr. UNINA-9910413444803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper / / edited by Mohammad S. Obaidat, Enrique Cabello
E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper / / edited by Mohammad S. Obaidat, Enrique Cabello
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XX, 371 p. 189 illus., 92 illus. in color.)
Disciplina 621.382
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Computer system failures
Application software
Computer networks - Security measures
Computer security
Coding theory
Information theory
Computer Communication Networks
System Performance and Evaluation
Information Systems Applications (incl. Internet)
Mobile and Network Security
Systems and Data Security
Coding and Information Theory
ISBN 3-030-11039-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare.
Record Nr. UNINA-9910337579303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Business and Telecommunications : 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26–28, 2018, Revised Selected Papers / / edited by Mohammad S. Obaidat
E-Business and Telecommunications : 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26–28, 2018, Revised Selected Papers / / edited by Mohammad S. Obaidat
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVII, 235 p. 134 illus., 59 illus. in color.)
Disciplina 621.382
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Computer security
Application software
Coding theory
Information theory
Computer system failures
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Coding and Information Theory
System Performance and Evaluation
ISBN 3-030-34866-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Optimal VNF Placement: Addressing Multiple Min-Cost Solutions -- Anonymity in Complex Transactions for e-Business -- Generation of High Quality Microwave Signal using Different Optoelectronic Techniques -- A Steganogaphic Scheme for MAC-Independent Opportunistic Routing & Encoding (MORE) Protocol -- Automated Verification of E-Commerce Protocols for Complex Transactions -- Intellectual Property Protection for Decentralized Deep Neural Networks -- Predicting CEO Misbehavior from Observables: Comparative Evaluation of Two Major Personality Models -- Compile-time Security Certification of Imperative Programming Languages -- Real-time Noise Reduction Algorithm for Video with Non-linear FIR Filter -- Cloudless Friend-to-Friend Middleware for Smartphones -- A Mixed Traffic Sharing and Resource Allocation for V2X Communication.
Record Nr. UNINA-9910357848703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Business and Telecommunications : 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers / / edited by Mohammad S. Obaidat
E-Business and Telecommunications : 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers / / edited by Mohammad S. Obaidat
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXIII, 475 p. 186 illus.)
Disciplina 658.84
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Data protection
Application software
Special purpose computers
E-commerce
Computer security
Computer Communication Networks
Security
Information Systems Applications (incl. Internet)
Special Purpose and Application-Based Systems
e-Commerce/e-business
Systems and Data Security
ISBN 3-319-67876-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data communication networking -- E-business -- Optical communication systems -- Security and cryptography -- Signal processing and multimedia applications -- Wireless networks and mobile systems.
Record Nr. UNINA-9910254826603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Business and Telecommunications : 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papers / / edited by Mohammad S. Obaidat, Pascal Lorenz
E-Business and Telecommunications : 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papers / / edited by Mohammad S. Obaidat, Pascal Lorenz
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXIII, 534 p. 178 illus. in color.)
Disciplina 621.382
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Computer security
Application software
Information storage and retrieval
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
ISBN 3-319-30222-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Paper -- Integrating Retail and e-Commerce Using Web Analytics and Intelligent Sensors -- Abstract -- 1 Introduction -- 2 The Scene -- 3 Retail and E-Retail and Markets -- 4 User Scenarios and Transforming Technologies -- 5 Management/Administrator Needs and Requirements for Analytics and User profiles -- 6 Intelligence and Sensors -- 7 E-Commerce and Retail Shop Analytics Using Intelligent Sensors -- 8 User Profiles -- 9 Emotional Analysis -- 10 An Integrated Architecture -- 11 Conclusions -- References -- Data Communication Networking -- High Level Policies in SDN -- 1 Introduction -- 2 High Level SDN Architecture -- 2.1 Network and Hosts -- 2.2 SDN Control Plane -- 2.3 Sources of High Level Information -- 2.4 High Level SDN Controller and SDN Applications -- 3 High Level SDN Examples -- 3.1 Application-Aware Networks -- 3.2 Identity-Aware Networks -- 3.3 Other Traffic Identifiers and Combinations -- 4 Use Cases -- 4.1 Remote Intrusion Detection System -- 4.2 Packet Filter -- 4.3 Path Load Balancing -- 4.4 Traffic Monitoring -- 5 Testbeds -- 5.1 Application-Aware Testbed -- 5.2 Identity-Aware Testbed -- 6 Related Work -- 6.1 Application Awareness in SDN -- 6.2 Identity Awareness in SDN -- 7 Discussion -- 7.1 Evaluation -- 7.2 Typical Scenarios -- 8 Conclusion -- References -- What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility -- 1 Introduction -- 2 Transport Layer Security Protocol -- 2.1 Cipher Suites -- 2.2 OpenSSL -- 2.3 SSL/TLS Version Distribution and Vulnerabilities -- 2.4 Available Tools -- 3 Practical Evaluation -- 3.1 Methodology -- 3.2 Compatibility Estimation for ACH's Cipher Strings -- 3.3 OpenSSL Support for Various Cipher Suites -- 3.4 Analyzing Available Cipher Suites Using O-Saft -- 4 Cipher Suite Proposal.
5 Summary and Concluding Remarks -- 5.1 Comparing the Cipher Strings -- 5.2 Conclusion -- References -- e-Business -- ARM: Architecture for Recruitment Matchmaking -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Concept and Architecture -- 3.1 RDB (Relational Database) -- 3.2 Interface -- 3.3 Triple Store -- 3.4 Recommendation Engine -- 4 RS Algorithms -- 4.1 Entity Recommendations -- 4.2 Team Recommendations -- 5 Testing and Validation -- 5.1 Access Speed -- 5.2 Recommendation Speed -- 5.3 Precision -- 5.4 Validation Scenarios -- 5.5 ICE-B Feedback -- 6 Conclusions -- Acknowledgements -- References -- Understanding Local mGovernment Applications: A Business Model Approach to the Case of Brussels -- Abstract -- 1 Introduction -- 2 Business Models and M-Government -- 2.1 Business Model Thinking in mGov -- 2.2 mGov Business Model Parameters and Mapping Methodology -- 3 The Brussels Context -- 4 Official Brussels Apps -- 4.1 Be.Brussels -- 4.2 Brussels Gardens -- 4.3 City of Brussels -- 4.4 FixMyStreet Brussels -- 4.5 STIB Mobile -- 4.6 Visit Brussels -- 5 Mapping -- 6 Discussion -- 7 Conclusions -- Acknowledgements -- Annex -- References -- Understanding the Use of Location Sharing Services on Social Networking Platforms in China -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 The Adoption of Location-Based Services -- 2.2 Contextual Integrity -- 2.3 Privacy Concerns in Location Sharing Services -- 3 Research Questions -- 4 Method -- 5 Research Findings -- 5.1 Motivations to Use Location Sharing Services -- 5.2 Barriers to Use Location Sharing Services -- 5.3 The Information Norms of Sharing Location -- 5.3.1 Where Do People Check-in? -- 5.3.2 When Do People Check-in? -- 5.3.3 What Information Can Be Gained in Friends' Shared Location Information? -- 5.4 Applying Contextual Integrity to Analyze the Privacy Concern.
5.4.1 Potential Audiences -- 5.4.2 Violation of Appropriateness -- 5.4.3 Violation of Distribution -- 6 Conclusion and Future Work -- References -- Large Scale Evaluation of an Adaptive E-Advertising User Model -- Abstract -- 1 Introduction -- 2 Related Research -- 3 Authoring Adaptive E-Advertising -- 4 Scenario -- 4.1 Scenario 1 -- 4.2 Scenario 2 -- 5 Case Study -- 5.1 Hypotheses -- 5.2 Case Study Setup -- 5.3 Results -- 5.4 User Tracking -- 5.5 Participant Feedback -- 6 Discussion -- 7 Conclusions and Future Work -- References -- Optical Communication Systems -- How Do the Multiple Tunable Receivers Per Node Affect the Efficiency of a WDM LAN? A Performance Analytical Study -- Abstract -- 1 Introduction -- 2 Network Model and Assumptions -- 3 Analysis -- 4 Performance Evaluation -- 5 Propagation Delay Latency Modelling -- 6 Conclusion -- Appendix -- References -- Security and Cryptography -- A Scalable Honeynet Architecture for Industrial Control Systems -- 1 Introduction -- 2 Assumptions and Research Questions -- 3 Related Work -- 4 Approach -- 5 Architecture -- 5.1 Data Capture -- 5.2 Data Collection -- 5.3 Honeynet Management -- 5.4 Implementation -- 6 Experimental Evaluation -- 6.1 Results -- 6.2 Modbus --- Honeynet-Level Analysis -- 6.3 IEC-104 --- Honeynet-level Analysis -- 7 Conclusion -- References -- Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications -- 1 Introduction -- 2 Related Work -- 3 The Proposed Features -- 4 Evaluation: Study Design -- 5 Evaluation: Analysis of Data -- 5.1 Descriptive Statistics -- 5.2 Hypothesis Testing -- 5.3 Classification Analysis -- 6 Conclusions and Future Works -- References -- Automated Verification of e-Cash Protocols -- 1 Introduction -- 2 Modeling e-Cash Protocols in the Applied -Calculus -- 3 Formalizing Security Properties -- 3.1 Forgery-Related Properties.
3.2 Privacy Properties -- 4 Case Studies -- 4.1 Chaum Online Protocol -- 4.2 DigiCash Protocol -- 4.3 Chaum Offline Protocol -- 4.4 Protocol by Peterson and Poupard -- 5 Conclusion -- References -- Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity Approach -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Code Obfuscation Using Kolmogorov Complexity -- 4.1 Applying Kolmogorov Complexity to Code Obfuscation -- 4.2 Adversary Model -- 4.3 On the Impossibility of Obfuscation -- 4.4 Security and Unintelligibility -- 4.5 Normalized Kolmogorov Complexity -- 5 Individual Security of Code Obfuscation -- 6 Conclusion and Future Work -- References -- The Entity Labeling Pattern for Modeling Operating Systems Access Control -- 1 Introduction -- 2 Related Work -- 3 SELinux Access Control -- 3.1 Security Architecture -- 3.2 Policy Semantics -- 4 Modeling Patterns -- 4.1 Core-Based Modeling -- 4.2 Entity Labeling -- 5 SELinux Security Model -- 5.1 EL Components -- 5.2 Core-Based Model -- 5.3 Specifying SELX Commands -- 6 Model Instantiation -- 6.1 State Space -- 6.2 Model Extensions -- 6.3 Model Dynamics -- 6.4 Results -- 7 Conclusions -- References -- Execution Path Classification for Vulnerability Analysis and Detection -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Source Code Profiling for Exploit Detection -- 3.2 Risk -- 4 Design and Implementation -- 4.1 Entroine's Architecture and Workflow -- 4.2 Taxonomy of Dangerous Instructions -- 4.3 Classification and Ranking System -- 5 Experiments and Results -- 5.1 Entroine's Example Run -- 5.2 Experimental Results on the Juliet Test Case -- 6 Conclusions -- References -- A Privacy-Sensitive Collaborative Approach to Business Process Development -- 1 Introduction -- 2 Environment -- 3 Privacy Model -- 3.1 BP Execution Sequence -- 3.2 Differential Privacy.
3.3 Privacy Requirement -- 4 Proposed Approach -- 4.1 Differentially Private BP Execution Sequences -- 4.2 Process Mining and BP Workflow Generation -- 5 Analysis -- 6 Experimental Evaluation -- 6.1 Dataset Description -- 6.2 Results -- 7 Implementation -- 8 Related Work -- 9 Conclusions and Future Work -- References -- Using OWL Reasoning for Evaluating XACML Policies -- 1 Introduction -- 2 An OWL-Based XACML Policy Framework -- 3 Axiomatic Policies -- 3.1 Policy Archetypes -- 3.2 Combining Policies -- 3.3 Axiomatic Policies Generation Algorithm -- 3.4 Policy Decision -- 4 Performances -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Partial Key Exposure Attacks on RSA with Exponent Blinding -- 1 Introduction -- 2 Related Works -- 3 RSA Applications -- 3.1 RSA -- 3.2 CRT-RSA -- 3.3 Exponent Blinding -- 3.4 Common Parameters Setting -- 4 General Strategy -- 4.1 Lattices -- 4.2 General Strategy -- 5 Attacks on RSA -- 5.1 Partial Information on LSBs of d* -- 5.2 Partial Information on MSBs of d* -- 6 Attacks on CRT-RSA -- 6.1 Partial Information on LSBs of dp* -- 6.2 Partial Information on MSBs of dp* -- 7 Experimental Results -- 7.1 Results with Known LSBs of d* -- 7.2 Results with Known MSBs of d* -- 7.3 Results with Known LSBs of dp* -- 7.4 Results with Known MSBs of dp* -- 8 Conclusions -- References -- A Generalized Authentication Scheme for Mobile Phones Using Gait Signals -- 1 Introduction -- 2 Related Works -- 3 The Instability of Sensor Orientation -- 3.1 Problem Statement -- 3.2 Proposed Solution -- 4 Gait Recognition Model Construction -- 4.1 Data Preprocessing -- 4.2 Gait Pattern Extraction -- 4.3 Gait Model Construction -- 5 Experiments -- 5.1 Dataset Description -- 5.2 Experimental Configuration -- 5.3 Verification Results -- 5.4 Identification Results -- 5.5 The Impacts of Disorientation Error -- 6 Conclusions.
References.
Record Nr. UNINA-9910254983303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Business and Telecommunications : 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers / / edited by Mohammad S. Obaidat, Andreas Holzinger, Joaquim Filipe
E-Business and Telecommunications : 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers / / edited by Mohammad S. Obaidat, Andreas Holzinger, Joaquim Filipe
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXIII, 538 p. 204 illus. in color.)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Computer security
Application software
Information storage and retrieval
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
ISBN 3-319-25915-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data communication networking -- E-business -- Optical communication systems.-Security and cryptography -- Signal processing and multimedia applications.-Wireless information networks and systems.
Record Nr. UNINA-9910299258703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Business and Telecommunications [[electronic resource] ] : International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers / / edited by Mohammad S. Obaidat, Joaquim Filipe
E-Business and Telecommunications [[electronic resource] ] : International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers / / edited by Mohammad S. Obaidat, Joaquim Filipe
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIV, 303 p. 122 illus.)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Computer security
Application software
Information storage and retrieval
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
ISBN 3-662-44791-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data communication networking.- E-business -- Optical communication systems.- Security and cryptography.- Wireless information systems -- Signal processing and multimedia.
Record Nr. UNINA-9910298988903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Business and Telecommunications [[electronic resource] ] : International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers / / edited by Mohammad S. Obaidat, Joaquim Filipe
E-Business and Telecommunications [[electronic resource] ] : International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers / / edited by Mohammad S. Obaidat, Joaquim Filipe
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVII, 419 p. 189 illus.)
Disciplina 621.382
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Computer security
Application software
Information storage and retrieval
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
ISBN 3-662-44788-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data communication networking -- E-business -- Optical communication systems -- Security and cryptography -- Signal processing and multimedia applications -- Wireless information networks and systems.
Record Nr. UNINA-9910298988803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui