This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2019), sponsored by the University of Milan, Milan, Italy, February 11-13, 2019. The conference deals both with the important core and the specialized issues in the areas of new dependability paradigms design and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The WIDECOM proceedings features papers addressing issues related to the design, analysis, and implementation, of…mehr
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2019), sponsored by the University of Milan, Milan, Italy, February 11-13, 2019. The conference deals both with the important core and the specialized issues in the areas of new dependability paradigms design and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The WIDECOM proceedings features papers addressing issues related to the design, analysis, and implementation, of infrastructures, systems, architectures, algorithms, and protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and IoT systems. It is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels.
Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2019), Milan, Italy, February 11-13, 2019;
Includes an array of topics networking computing, mobile/ubiquitous systems, cloud systems, and IoT systems;
Addresses issues related to protecting information security and establishing trust in the digital space.
Produktdetails
Produktdetails
Lecture Notes on Data Engineering and Communications Technologies 27
Professor Isaac Woungang received his Ph.D. degree in Mathematics from the University of South, Toulon and Var, France. From 1999 to 2002, he worked as a software engineer in the Photonic Line Systems Group, Nortel Networks, Ottawa, Ontario, Canada. Since 2002, he has been with Ryerson University, where he is now a full professor of Computer Science and Director of the Distributed Applications and Broad band (DABNEL) Research Lab. Dr. Woungang has published 10 books and over 92 refereed technical articles in scholarly international journals and proceedings of international conferences. He has served as Associate Editor of the Computers and Electrical Engineering (Elsevier), and the International Journal of Communication Systems (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Mathematical and Computer Modeling (Elsevier), Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), andTelecommunication Systems (Springer). From 2012 to 2017, he served as Chair of Computer Chapter, IEEE Toronto Section. Professor Sanjay Kumar Dhurandher received the M. Tech. and Ph.D. Degrees in Computer Sciences from the Jawaharlal Nehru University, New Delhi, India. He is presently working as a Professor in the Department of Information Technology, Netaji Subhas University of Technology (Formerly NSIT) New Delhi, India. He is also the Head of the IT Department at NSUT and the Head of the Advanced Centre CAITFS, Department of Information Technology, NSUT, New Delhi. He is a Senior Member of IEEE.Currently, he is serving as the Associate Editor of the International Journal of Communication Systems published by John Wiley & Sons and even as the Associate Editor of Security and Privacy Journal, by John Wiley & Sons. He served as a Guest Editor, to the Special Issue of Computers & Electrical Engineering by Elsevier and IET Communications. He has even written/editeda book titled "Routing in Opportunistic Networks" published by Springer. From 1995 to 2000 he worked as a Scientist/Engineer at the Institute for Plasma Research, Gujarat, India which is under the Department of Atomic Energy, India. His current research interests include Wireless ad-hoc Networks, Sensor Networks, Computer Networks, Network Security, Underwater Sensor Networks, Opportunistic Networks and Cognitive Radio Networks.
Inhaltsangabe
Chapter 1. Performance Evaluation of G.711 and GSM Codecs on VoIP Applications using OSPF and RIP Routing Protocols.- Chapter 2. Cyclic Redundancy Check based Data Authentication in Opportunistic Networks.- Chapter 3. Hybrid Cryptographic Based Approach for Privacy Preservation in Location Based Services.- Chapter 4. Design of Energy-Aware PRoPHET and Spray-and-Wait Routing Protocols for Opportunistic Networks.- Chapter 5.An Asymmetric RSA based Security Approach for Opportunistic IoT.- Chapter 6. Performance Analysis of A* Based Hop Selection Technique in Opportunistic Networks through Movement Mobility Models.- Chapter 7. Data Loss Prevention Using Document Semantic Signature.- Chapter 8. Data Loss Prevention Using Document Semantic Signature.- Chapter 9. PSARV: Particle Swarm Angular Routing in Vehicular Ad hoc Networks.- Chapter 10. A Reliable Firefly-based Routing Protocol for Efficient Communication in Vehicular Ad Hoc Networks.- Chapter 11. Exploring the Application of Random Sampling in Spectrum Sensing.- Chapter 12. White-box Cryptography: A Time-security Trade-off for the SPNbox Family.- Chapter 13. CESIS: Cost Effective and Self-regulating Irrigation System.- Chapter 14. Maximum Eigenvalue based detection using Jittered Random Sampling.- Chapter 15. Prevention of Flooding Attacks in Mobile Ad hoc Networks.- Chapter 16. Prevention of Flooding Attacks in Mobile Ad hoc Networks.- Chapter 17. Real Time Spectrum Occupancy Prediction.- Chapter 18. SCC-LBS: Secure Criss-Cross Location Based Service in Logistics.
Chapter 1. Performance Evaluation of G.711 and GSM Codecs on VoIP Applications using OSPF and RIP Routing Protocols.- Chapter 2. Cyclic Redundancy Check based Data Authentication in Opportunistic Networks.- Chapter 3. Hybrid Cryptographic Based Approach for Privacy Preservation in Location Based Services.- Chapter 4. Design of Energy-Aware PRoPHET and Spray-and-Wait Routing Protocols for Opportunistic Networks.- Chapter 5.An Asymmetric RSA based Security Approach for Opportunistic IoT.- Chapter 6. Performance Analysis of A* Based Hop Selection Technique in Opportunistic Networks through Movement Mobility Models.- Chapter 7. Data Loss Prevention Using Document Semantic Signature.- Chapter 8. Data Loss Prevention Using Document Semantic Signature.- Chapter 9. PSARV: Particle Swarm Angular Routing in Vehicular Ad hoc Networks.- Chapter 10. A Reliable Firefly-based Routing Protocol for Efficient Communication in Vehicular Ad Hoc Networks.- Chapter 11. Exploring the Application of Random Sampling in Spectrum Sensing.- Chapter 12. White-box Cryptography: A Time-security Trade-off for the SPNbox Family.- Chapter 13. CESIS: Cost Effective and Self-regulating Irrigation System.- Chapter 14. Maximum Eigenvalue based detection using Jittered Random Sampling.- Chapter 15. Prevention of Flooding Attacks in Mobile Ad hoc Networks.- Chapter 16. Prevention of Flooding Attacks in Mobile Ad hoc Networks.- Chapter 17. Real Time Spectrum Occupancy Prediction.- Chapter 18. SCC-LBS: Secure Criss-Cross Location Based Service in Logistics.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826