- 5 Ergebnisse
Kleinster Preis: € 130,89, größter Preis: € 209,00, Mittelwert: € 162,75
1
Bestellen
bei ebooks.com
€ 209,00
Bestellengesponserter Link
>100:

Computational Intelligence and Security - neues Buch

2005, ISBN: 9783540315988

The International Conference on Computational Intelligence and Security (CIS) is an annualinternationalconference that bringstogether researchers,engineers, developers and practitioners f… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
2
Computational Intelligence and Security - Yue Hao; Jiming Liu; Yuping Wang; Yiu-ming Cheung; Hujun Yin; Licheng Jiao; Jianfeng Ma; Yong-Chang Jiao
Bestellen
bei Springer.com
€ 130,89
Bestellengesponserter Link

Yue Hao; Jiming Liu; Yuping Wang; Yiu-ming Cheung; Hujun Yin; Licheng Jiao; Jianfeng Ma; Yong-Chang Jiao:

Computational Intelligence and Security - neues Buch

ISBN: 9783540315988

Computer Science; Data Encryption; Artificial Intelligence (incl. Robotics); Information Storage and Retrieval; Information Systems Applications (incl. Internet); Computation by Abstract … Mehr…

  - Versandkosten:zzgl. Versandkosten.
3
Bestellen
bei lehmanns.de
€ 165,15
Versand: € 9,951
Bestellengesponserter Link
Yiu-ming Cheung; Yue Hao; Licheng Jiao; Yong-Chang Jiao; Jiming Liu; Jianfeng Ma; Yuping Wang; Hujun Yin:
Computational Intelligence and Security - neues Buch

2006

ISBN: 9783540315988

International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Heidelberg, 2006

Versandkosten:Download sofort lieferbar. (EUR 9.95)
4
Bestellen
bei lehmanns.de
€ 170,56
Versand: € 0,001
Bestellengesponserter Link
Yiu-ming Cheung; Yue Hao; Licheng Jiao; Yong-Chang Jiao; Jiming Liu; Jianfeng Ma; Yuping Wang; Hujun Yin:
Computational Intelligence and Security - neues Buch

2006, ISBN: 9783540315988

International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, eBook Download (PDF), eBooks, [PU: Springer Berlin Heidelberg]

Versandkosten:Download sofort lieferbar, , Versandkostenfrei innerhalb der BRD. (EUR 0.00)
5
Bestellen
bei hive.co.uk
£ 122,40
(ca. € 138,15)
Bestellengesponserter Link
Bernard Maskit:
Computational Intelligence and Security : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II - neues Buch

2005, ISBN: 9783540315988

; PDF; Computing > Computer security > Data encryption, Springer Berlin Heidelberg

  - No. 9783540315988. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Computational Intelligence and Security


EAN (ISBN-13): 9783540315988
Erscheinungsjahr: 2005
Herausgeber: Springer Berlin Heidelberg

Buch in der Datenbank seit 2017-02-09T17:11:28+01:00 (Berlin)
Detailseite zuletzt geändert am 2021-08-03T12:56:29+02:00 (Berlin)
ISBN/EAN: 9783540315988

ISBN - alternative Schreibweisen:
978-3-540-31598-8
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: yin, yong liu, wang ming, hao wang
Titel des Buches: china 2005


Daten vom Verlag:

Autor/in: Yue Hao; Jiming Liu; Yuping Wang; Yiu-ming Cheung; Hujun Yin; Licheng Jiao; Jianfeng Ma; Yong-Chang Jiao
Titel: Lecture Notes in Computer Science; Lecture Notes in Artificial Intelligence; Computational Intelligence and Security - International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II
Verlag: Springer; Springer Berlin
1166 Seiten
Erscheinungsjahr: 2006-06-18
Berlin; Heidelberg; DE
Sprache: Englisch
160,49 € (DE)
165,00 € (AT)
213,00 CHF (CH)
Available
XLII, 1166 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Bayesian networks; Fuzzy; architecture; cognition; computational intelligence; cryptographic protocols; data mining; decision making; fuzzy systems; information hiding; information retrieval; intelligence; intelligent age; learning; security; algorithm analysis and problem complexity; C; Cryptology; Artificial Intelligence; Information Storage and Retrieval; Information Systems Applications (incl. Internet); Computation by Abstract Devices; Algorithm Analysis and Problem Complexity; Cryptology; Artificial Intelligence; Information Storage and Retrieval; Computer and Information Systems Applications; Theory of Computation; Algorithms; Computer Science; Kryptografie, Verschlüsselungstechnologie; Künstliche Intelligenz; Informationsrückgewinnung, Information Retrieval; Data Warehousing; Angewandte Informatik; Theoretische Informatik; Algorithmen und Datenstrukturen; BC

Cryptography and Coding.- A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2 m ).- An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings.- FMS Attack-Resistant WEP Implementation Is Still Broken.- Design of a New Kind of Encryption Kernel Based on RSA Algorithm.- On the Security of Condorcet Electronic Voting Scheme.- Special Distribution of the Shortest Linear Recurring Sequences in Z /(p) Field.- Cryptanalysis of a Cellular Automata Cryptosystem.- A New Conceptual Framework Within Information Privacy: Meta Privacy.- Error Oracle Attacks on Several Modes of Operation.- Stability of the Linear Complexity of the Generalized Self-shrinking Sequences.- On the Construction of Some Optimal Polynomial Codes.- Perceptual Hashing of Video Content Based on Differential Block Similarity.- Cryptographic Protocols.- Secure Software Smartcard Resilient to Capture.- Revised Fischlin’s (Blind) Signature Schemes.- Certificateless Threshold Signature Schemes.- An Efficient Certificateless Signature Scheme.- ID-Based Restrictive Partially Blind Signatures.- Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing.- On Anonymity of Group Signatures.- The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols.- Password-Based Group Key Exchange Secure Against Insider Guessing Attacks.- On the Security of Some Password-Based Key Agreement Schemes.- A New Group Rekeying Method in Secure Multicast.- Pairing-Based Provable Blind Signature Scheme Without Random Oracles.- Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings.- An Identity-Based Threshold Signcryption Scheme with Semantic Security.- A Token-Based Single Sign-On Protocol.- Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing.- Efficient Compilers for Authenticated Group Key Exchange.- Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.- Intrusion Detection.- An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks.- A New User-Habit Based Approach for Early Warning of Worms.- A Multi-gigabit Virus Detection Algorithm Using Ternary CAM.- Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems.- Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems.- D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection.- A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics.- SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation.- A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services.- Tamper Detection for Ubiquitous RFID-Enabled Supply Chain.- Measuring the Histogram Feature Vector for Anomaly Network Traffic.- Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme.- Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model.- Reducing Worm Detection Time and False Alarm in Virus Throttling.- Protection Against Format String Attacks by Binary Rewriting.- Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function.- Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information.- Parallel Optimization Technology for Backbone Network Intrusion Detection System.- Attack Scenario Construction Based on Rule and Fuzzy Clustering.- A CBR Engine Adapting to IDS.- Application of Fuzzy Logic for Distributed Intrusion Detection.- Security Models and Architecture.- Dynamic Access Control for Pervasive Grid Applications.- On the Security of the Canetti-Krawczyk Model.- A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks.- A Variant of Poly1305 MAC and Its Security Proof.- Covert Channel Identification Founded on Information Flow Analysis.- Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems.- Design and Implementation of a Parallel Crypto Server.- Survivability Computation of Networked Information Systems.- Assessment of Windows System Security Using Vulnerability Relationship Graph.- A New (t, n)-Threshold Multi-secret Sharing Scheme.- An Efficient Message Broadcast Authentication Scheme for Sensor Networks.- Digital Image Authentication Based on Error-Correction Codes.- Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e.- Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme.- Building Security Requirements Using State Transition Diagram at Security Threat Location.- Study on Security iSCSI Based on SSH.- A Scheduling Algorithm Based on a Trust Mechanism in Grid.- Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device.- Worm Propagation Modeling and Analysis on Network.- An Extensible AAA Infrastructure for IPv6.- The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i.- A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks.- Security Management.- A Virtual Bridge Certificate Authority Model.- Weak Signals in Information Security Management.- PDTM: A Policy-Driven Trust Management Framework in Distributed Systems.- Methodology of Quantitative Risk Assessment for Information System Security.- A Secure and Efficient (t, n) Threshold Verifiable Multi-secret Sharing Scheme.- Improvement on an Optimized Protocol for Mobile Network Authentication and Security.- Neural Network Based Flow Forecast and Diagnosis.- Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach.- Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.- Topology-Based Macroscopical Response and Control Technology for Network Security Event.- Watermarking and Information Hiding.- Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords.- Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients.- An Image Steganography Using Pixel Characteristics.- Alternatives for Multimedia Messaging System Steganography.- Error Concealment for Video Transmission Based on Watermarking.- Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images.- An Image Hiding Algorithm Based on Bit Plane.- A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack.- Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video.- Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning.- Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems.- An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis.- A Digital Watermarking Technique Based on Wavelet Packages.- A Spectral Images Digital Watermarking Algorithm.- Restoration in Secure Text Document Image Authentication Using Erasable Watermarks.- Web and Network Applications.- The Study of RED Algorithm Used Multicast Router Based Buffer Management.- Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection.- MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context Management.- A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm.- On a Novel Methodology for Estimating Available Bandwidth Along Network Paths.- A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows.- Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment.- An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema.- A Fuzzy Integral Method to Merge Search Engine Results on Web.- The Next Generation PARLAY X with QoS/QoE.- A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network.- of Knowledge Management System for Technical Support in Construction Industries.- An Event Correlation Approach Based on the Combination of IHU and Codebook.- Image and Signal Processing.- Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform.- A Dynamic Face and Fingerprint Fusion System for Identity Authentication.- Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique.- Binarized Revocable Biometrics in Face Recognition.- Short Critical Area Computational Method Using Mathematical Morphology.- A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm Optimization.- MFCC and SVM Based Recognition of Chinese Vowels.- A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT Domain.- Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing.- Component-Based Online Learning for Face Detection and Verification.- SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image Compression.- Modified EZW Coding for Stereo Residual.- Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter Banks.- Fast Motion Estimation Scheme for Real Time Multimedia Streaming with H.264.- Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter Implementation.- Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic Imageries.- Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical Flow.- Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization.- Image Classification and Delineation of Fragments.- A Novel Wavelet Image Coding Based on Non-uniform Scalar Quantization.- A General Image Based Nematode Identification System Design.- A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for CDMA Systems.- New Electronic Digital Image Stabilization Algorithm in Wavelet Transform Domain.- Line Segments and Dominate Points Detection Based on Hough Transform.- The Study of the Auto Color Image Segmentation.- Regularized Image Restoration by Means of Fusion for Digital Auto Focusing.- Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection.- Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN Estimation.- SUSAN Window Based Cost Calculation for Fast Stereo Matching.- An Efficient Adaptive De-blocking Algorithm.- Facial Features Location by Analytic Boosted Cascade Detector.- New Approach for Segmentation and Pattern Recognition of Jacquard Images.- Nonstationarity of Network Traffic Within Multi-scale Burstiness Constraint.- Principle of Image Encrypting Algorithm Based on Magic Cube Transformation.- A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal Filtering.- Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis Entropy.- Applications.- Incremental Fuzzy Decision Tree-Based Network Forensic System.- Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying Delay.- Using Concept Taxonomies for Effective Tree Induction.- A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities.- Automatic Classification of Korean Traditional Music Using Robust Multi-feature Clustering.- A Private and Efficient Mobile Payment Protocol.- Universal Designated-Verifier Proxy Blind Signatures for E-Commerce.- An Efficient Control Method for Elevator Group Control System.- Next Generation Military Communication Systems Architecture.- Early Warning for Network Worms.- Skeleton Representation of Character Based on Multiscale Approach.- Channel Equalization Based on Two Weights Neural Network.- Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic Set.- Ring-Based Anonymous Fingerprinting Scheme.- Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code.- Broadcast Encryption Using Identity-Based Public-Key Cryptosystem.- Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset.- Design and Implementation of Crypto Co-processor and Its Application to Security Systems.- Continuous Speech Research Based on HyperSausage Neuron.- Variable-Rate Channel Coding for Space-Time Coded MIMO System.- A New Watermarking Method Based on DWT.- Efficient Point Rendering Method Using Sequential Level-of-Detail.- Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued Wavelets.- Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus.- Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel.

Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:

Neuestes ähnliches Buch:
9780780318977 THIRD IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS / IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE, 1994, Sponsored by the IEEE NEURAL NETWORKS COUNCIL, Proceedings of: 26-29 June 1994, Walt Disney World Dolphin Hotel, Orlando, Florida (Bonissone, Piero P. (General Chair); Institute of Electrical and Electronic Engineers; The Neural Network Council; et.al.; Various)


< zum Archiv...