top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Biometric-Based Physical and Cybersecurity Systems / / edited by Mohammad S. Obaidat, Issa Traore, Isaac Woungang
Biometric-Based Physical and Cybersecurity Systems / / edited by Mohammad S. Obaidat, Issa Traore, Isaac Woungang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (590 pages)
Disciplina 006.4
Soggetto topico Signal processing
Image processing
Speech processing systems
Biometry
System safety
Computer security
Signal, Image and Speech Processing
Biometrics
Security Science and Technology
Systems and Data Security
ISBN 3-319-98734-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Part 1: Advances in Legacy Technologies -- Advances in Fingerprint Technology -- Recognition-based on Eye Biometrics Iris and Retina -- 3D Hand Geometry Recognition -- Fundamentals and Advances in 3D Face Recognition -- Part 2: Emerging Technologies -- Advances in Key Stroke Dynamics-based Security Schemes -- Behavioral Biometrics Based on Human-Computer Interaction Devices -- Continuous Authentication Using Writing Style -- Facets and Promises of Gait Biometrics Recognition -- Online Signature-based Biometrics Recognition -- EEG-based Biometrics -- Part 3: Hybrid Technologies -- Multimodal Biometrics Invariant Fusion Techniques -- Biometrics Based on Healthcare Sensors -- Biometric Authentication for Wearables -- Cognitive Biometrics for User Authentication -- Finger Knuckle based multi-biometrics authentication systems -- Part 4: Enabling Technologies -- Leveraging Cloud-based Resources for Automated Biometric Identification -- Automated Biometric Authentication with Cloud Computing -- Biometrics Security and Internet of Things -- Part 5: Technology and Society -- Protecting the Integrity of Elections using Biometrics -- Ethical, Legal, and Social Implications of Biometrics Technologies -- Conclusion.
Record Nr. UNINA-9910337652003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments [[electronic resource] ] : Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedings / / edited by Issa Traore, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments [[electronic resource] ] : Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedings / / edited by Issa Traore, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XXIII, 125 p. 35 illus., 25 illus. in color.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer communication systems
Computer security
Application software
Artificial intelligence
Data encryption (Computer science)
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Artificial Intelligence
Cryptology
ISBN 3-030-03712-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Identifying vulnerabilities and attacking capabilities against PCS in VANET -- An RSA-based User Authentication Scheme for Smart-Homes using Smart Card -- Analysing Data Security Requirements of Android Mobile Banking Application -- Adaptive Mobile Keystroke Dynamic Authentication using Ensemble Classification Methods -- Automating Incident Classification Using Sentiment Analysis and Machine Learning -- Security Analysis of an Identity-Based Data Aggregation Protocol for the Smart Grid -- A More Efficient Secure Fully Verifiable Delegation Scheme for Simultaneous Group Exponentiations -- An efficient framework for improved task offloading in edge computing -- Secure and efficient enhanced sharing of data over cloud using Attribute based Encryption with hash functions -- Blockchain Technology and its Applications in FinTech.
Record Nr. UNISA-996466188503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments : Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedings / / edited by Issa Traore, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments : Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedings / / edited by Issa Traore, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XXIII, 125 p. 35 illus., 25 illus. in color.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer communication systems
Computer security
Application software
Artificial intelligence
Data encryption (Computer science)
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Artificial Intelligence
Cryptology
ISBN 3-030-03712-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Identifying vulnerabilities and attacking capabilities against PCS in VANET -- An RSA-based User Authentication Scheme for Smart-Homes using Smart Card -- Analysing Data Security Requirements of Android Mobile Banking Application -- Adaptive Mobile Keystroke Dynamic Authentication using Ensemble Classification Methods -- Automating Incident Classification Using Sentiment Analysis and Machine Learning -- Security Analysis of an Identity-Based Data Aggregation Protocol for the Smart Grid -- A More Efficient Secure Fully Verifiable Delegation Scheme for Simultaneous Group Exponentiations -- An efficient framework for improved task offloading in edge computing -- Secure and efficient enhanced sharing of data over cloud using Attribute based Encryption with hash functions -- Blockchain Technology and its Applications in FinTech.
Record Nr. UNINA-9910349391003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments [[electronic resource] ] : First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings / / edited by Issa Traore, Isaac Woungang, Ahmed Awad
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments [[electronic resource] ] : First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings / / edited by Issa Traore, Isaac Woungang, Ahmed Awad
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXII, 183 p. 68 illus.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer communication systems
Application software
Software engineering
User interfaces (Computer systems)
Personal computers
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
User Interfaces and Human Computer Interaction
Personal Computing
ISBN 3-319-69155-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Holistic model for HTTP botnet detection based on DNS traffic analysis -- Detecting broad length algorithmically generated domains -- Secure cloud computing: multithreaded fully homomorphic encryption for legal metrology -- Detecting command and control channel of botnets in clouds -- An experimental framework for investigating security and privacy of IoT devices -- Dynamic cypher for enhanced cryptography and communication for Internet of Things -- An inter-device authentication scheme for smart homes using one-time-password over infrared channel -- Detection and prevention of blackhole attacks in wireless sensor networks -- Detection of online fake news using N-gram analysis and machine learning techniques -- Security protocol of social payment apps -- Spectral-spatial classification of hyperspectral imagery using support vector and Fuzzy-MRF -- Infant monitoring system using wearable sensors based on blood oxygen saturation -- Network behavioral analysis for zero-day malware detection. Network Behavioral Analysis for Zero-day Malware Detection.
Record Nr. UNISA-996465329203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments : First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings / / edited by Issa Traore, Isaac Woungang, Ahmed Awad
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments : First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings / / edited by Issa Traore, Isaac Woungang, Ahmed Awad
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXII, 183 p. 68 illus.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer communication systems
Application software
Software engineering
User interfaces (Computer systems)
Personal computers
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
User Interfaces and Human Computer Interaction
Personal Computing
ISBN 3-319-69155-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Holistic model for HTTP botnet detection based on DNS traffic analysis -- Detecting broad length algorithmically generated domains -- Secure cloud computing: multithreaded fully homomorphic encryption for legal metrology -- Detecting command and control channel of botnets in clouds -- An experimental framework for investigating security and privacy of IoT devices -- Dynamic cypher for enhanced cryptography and communication for Internet of Things -- An inter-device authentication scheme for smart homes using one-time-password over infrared channel -- Detection and prevention of blackhole attacks in wireless sensor networks -- Detection of online fake news using N-gram analysis and machine learning techniques -- Security protocol of social payment apps -- Spectral-spatial classification of hyperspectral imagery using support vector and Fuzzy-MRF -- Infant monitoring system using wearable sensors based on blood oxygen saturation -- Network behavioral analysis for zero-day malware detection. Network Behavioral Analysis for Zero-day Malware Detection.
Record Nr. UNINA-9910484483503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui