top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security and Privacy in Communication Networks [[electronic resource] ] : SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings / / edited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
Security and Privacy in Communication Networks [[electronic resource] ] : SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings / / edited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XI, 339 p. 104 illus.)
Disciplina 621.3821
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Computer communication systems
Systems and Data Security
Security
Cryptology
Computer Communication Networks
ISBN 3-319-78816-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access control -- Language-based security -- Malicious software -- Network security -- Cloud security -- Software security -- Operating system security -- Privacy protection -- Database security -- Security models -- Novel models -- Techniques -- Protocols -- Algorithms -- Architectures.
Record Nr. UNINA-9910299267103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in Communication Networks [[electronic resource] ] : 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings / / edited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
Security and Privacy in Communication Networks [[electronic resource] ] : 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings / / edited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIV, 855 p. 285 illus.)
Disciplina 621.3821
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Computer communication systems
Systems and Data Security
Security
Cryptology
Computer Communication Networks
ISBN 3-319-78813-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and privacy in machine learning -- Differential privacy -- Cyber security research.
Record Nr. UNINA-9910299267003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in Communication Networks [[electronic resource] ] : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings / / edited by Robert Deng, Jian Weng, Kui Ren, Vinod Yegneswaran
Security and Privacy in Communication Networks [[electronic resource] ] : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings / / edited by Robert Deng, Jian Weng, Kui Ren, Vinod Yegneswaran
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XV, 781 p. 256 illus.)
Disciplina 005.8
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Computer communication systems
Computers and civilization
Artificial intelligence
Systems and Data Security
Security
Cryptology
Computer Communication Networks
Computers and Society
Artificial Intelligence
ISBN 3-319-59608-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910254812703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings / / edited by Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, KAI XING
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings / / edited by Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, KAI XING
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 536 p. 231 illus.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Computer science
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
Computer Science
ISBN 3-642-39701-8
Classificazione DAT 256f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient’s Motion Recognition Based on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient’s Motion Recognition Based on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Traffic Information Query Strategy in VANETs -- Navigation for Indoor Mobile Robot Based on Wireless Sensor Network -- iMac: Strategy-Proof Incentive Mechanism for Mobile Crowdsourcing -- Social Welfare Maximization in Participatory Smartphone Sensing -- An Optimal Solution for Round Rotation Time Setting in LEACH -- UPC-MAC: A Power Control MAC Protocol for Underwater Sensor Networks -- FMAC for Coexisting Ad Hoc Cognitive Radio Networks -- Effective RSS Sampling for Forensic Wireless Localization -- An Optimal Leakage Detection Strategy for Underground Pipelines Using Magnetic Induction-Based Sensor Networks -- Compressive Data Retrieval with Tunable Accuracy in Vehicular Sensor Networks -- Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming -- Photo Forensics on Shanzhai Mobile Phone -- Local Information Storage Protocol for Urban Vehicular Networks -- Maximum Independent Set of Links with Power Control -- Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor Nodes -- The Trading between Virtual Mobile Operator and Wireless Service Provider in the Two-Tier Femtocell Network -- Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks -- Social Communications Assisted Epidemic Disease Influence Minimization.
Record Nr. UNISA-996466267003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings / / edited by Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, KAI XING
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings / / edited by Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, KAI XING
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 536 p. 231 illus.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Computer science
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
Computer Science
ISBN 3-642-39701-8
Classificazione DAT 256f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient’s Motion Recognition Based on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient’s Motion Recognition Based on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Traffic Information Query Strategy in VANETs -- Navigation for Indoor Mobile Robot Based on Wireless Sensor Network -- iMac: Strategy-Proof Incentive Mechanism for Mobile Crowdsourcing -- Social Welfare Maximization in Participatory Smartphone Sensing -- An Optimal Solution for Round Rotation Time Setting in LEACH -- UPC-MAC: A Power Control MAC Protocol for Underwater Sensor Networks -- FMAC for Coexisting Ad Hoc Cognitive Radio Networks -- Effective RSS Sampling for Forensic Wireless Localization -- An Optimal Leakage Detection Strategy for Underground Pipelines Using Magnetic Induction-Based Sensor Networks -- Compressive Data Retrieval with Tunable Accuracy in Vehicular Sensor Networks -- Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming -- Photo Forensics on Shanzhai Mobile Phone -- Local Information Storage Protocol for Urban Vehicular Networks -- Maximum Independent Set of Links with Power Control -- Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor Nodes -- The Trading between Virtual Mobile Operator and Wireless Service Provider in the Two-Tier Femtocell Network -- Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks -- Social Communications Assisted Epidemic Disease Influence Minimization.
Record Nr. UNINA-9910484645303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui