This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2016, held in Taichung, Taiwan, in July 2016. The 15 revised full papers presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2016, held in Taichung, Taiwan, in July 2016.
The 15 revised full papers presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
Produktdetails
Produktdetails
Communications in Computer and Information Science 797
Performance on clustering routing for naturally deployed wireless sensor networks.- Mobile security assurance for automotive software through ArchiMate.- A generalized data inconsistency detection model for wireless sensor networks.- Building a frame-based cyber security learning game.- personal identification using time and frequency domain features of ECG lead-I.- A secure color-code key exchange protocol for mobile chat application.- Design and implement SPEEX speech technology on ARM processor.- A discrete wavelet transformation based fast and secure transmission of images for group communication.- An automated graph based approach to risk assessment for computer networks with mobile components.- Assessment of computer network resilience under impact of cyber attacks on the basis of stochastic networks conversion.- The cryptanalysis of WPA & WPA2 Using the parallel-computing with GPUs.- A policy management system based on multi-dimensional attribution label.- Access controlfor cross-border transfer of sensor data.- Security analysis oriented physical components modeling in quantum key distribution.- A novel hybrid architecture for high speed regular expression matching.
Performance on clustering routing for naturally deployed wireless sensor networks.- Mobile security assurance for automotive software through ArchiMate.- A generalized data inconsistency detection model for wireless sensor networks.- Building a frame-based cyber security learning game.- personal identification using time and frequency domain features of ECG lead-I.- A secure color-code key exchange protocol for mobile chat application.- Design and implement SPEEX speech technology on ARM processor.- A discrete wavelet transformation based fast and secure transmission of images for group communication.- An automated graph based approach to risk assessment for computer networks with mobile components.- Assessment of computer network resilience under impact of cyber attacks on the basis of stochastic networks conversion.- The cryptanalysis of WPA & WPA2 Using the parallel-computing with GPUs.- A policy management system based on multi-dimensional attribution label.- Access controlfor cross-border transfer of sensor data.- Security analysis oriented physical components modeling in quantum key distribution.- A novel hybrid architecture for high speed regular expression matching.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826