e-Business and telecommunications 7th international joint conference, ICETE 2010, Athens, Greece, July 26 - 28, 2010 ; revised selected papers

Part 1.Invited Papere-Business Challenges and Directions: Important Themes from the First ICE-B WorkshopPart 2.Part I: Data Communication Networking (DCNET)Static Analysis of Routing and Firewall Policy ConfigurationsThreshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor NetworksThe...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: ICETE (BerichterstatterIn)
Weitere Verfasser: Obaidat, Mohammad S. (HerausgeberIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Berlin, Heidelberg u.a. Springer 2012
Schriftenreihe:Communications in computer and information science 222
Schlagworte:
Online Zugang:Inhaltsverzeichnis
Inhaltstext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Part 1.Invited Papere-Business Challenges and Directions: Important Themes from the First ICE-B WorkshopPart 2.Part I: Data Communication Networking (DCNET)Static Analysis of Routing and Firewall Policy ConfigurationsThreshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor NetworksThe Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSAMobile Applications Middleware for File SwappingPart 3.Part II: e-Business (ICE-B)Front matterOptimization of a Handwriting Recognition Algorithm for a Mobile Enterprise Health Information System on the Basis of Real-Life Usability ResearchA Social Location-Based Emergency Service to Eliminate the Bystander EffectPart 4.Part III: Optical Communication Systems (OPTICS)Converged Optical Networks for Multimedia Distribution and Data Services in Hospitality EnvironmentsPart 5.Part IV: Security and Cryptography (SECRYPT)Differential Resynchronization Attacks on Reduced Round SNOW 3GModelling Uncertain and Time-Dependent Security Labels in MLS SystemsSum Aggregation in Sensor Networks While Preserving Confidentiality and IntegrityStream Cipher-Based Hash Function and Its SecurityFlexible Anonymous Subscription SchemesProxiable Designated Verifier SignatureAdaptive and Composable Non-interactive String-Commitment ProtocolsDynamic Adaptation of Security and QoS in Energy-Harvesting Sensors NodesThreshold Discernible Ring SignaturesUniversally Composable Non-committing Encryptions in the Presence of Adaptive AdversariesSelectively Traceable Anonymous and Unlinkable Token-Based TransactionsAn Encryption Scheme for a Secure Policy UpdatingMachine Learning for the Detection of Spam in Twitter NetworksPart 6.Part V: Signal Processing and Multimedia Applications (SIGMAP)Front matterDeformable Multi-object Tracking Using Full Pixel Matching of ImageA Multi-sensor System for Monitoring the Performance of Elite SwimmersMaximum a Posteriori Decoding of Arithmetic Codes in Joint Source-Channel CodingAn Ensemble Approach to Improve Microaneurysm Candidate ExtractionPart 7.Part VI: Wireless Information Networks and Systems (WINSYS).
Beschreibung:Literaturangaben
Beschreibung:XVI, 448 S.
Ill., graph. darst.
24 cm
ISBN:9783642252051
978-3-642-25205-1
3642252052
3-642-25205-2