E-Business and Telecommunications
Springer International Publishing (Verlag)
978-3-030-11038-3 (ISBN)
Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph.- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study.- Approaches to Securing P2PSIP in MANETs.- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes.- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements.- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers.- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256.- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack.- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy.- History-based Throttling of Distributed Denial-of-Service Attacks.- LocalPKI: An Interoperable and IoT Friendly PKI.- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption.- Computer-based Analysis of Tomatis Listening Test System Audio Data.- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks.- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application.- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance.- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare.
| Erscheinungsdatum | 19.01.2019 |
|---|---|
| Reihe/Serie | Communications in Computer and Information Science |
| Zusatzinfo | XX, 371 p. 189 illus., 92 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 599 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Schlagworte | Applications • Artificial Intelligence • authentication • bandwidth • communication channels (information theory) • Computer Networks • Computer Science • conference proceedings • cryptography • Data Security • Informatics • Internet • internet protocols • Network Security • Public Key Cryptography • Quality of Service (QoS) • Research • sensor networks • sensors • Signal Processing • Software engineering • Telecommunication networks • telecommunication traffic • wireless networks • wireless telecommunication systems |
| ISBN-10 | 3-030-11038-9 / 3030110389 |
| ISBN-13 | 978-3-030-11038-3 / 9783030110383 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich