e-Business and telecommunications 7th international joint conference, ICETE 2010, Athens, Greece, July 26 - 28, 2010 ; revised selected papers
Part 1.Invited Papere-Business Challenges and Directions: Important Themes from the First ICE-B WorkshopPart 2.Part I: Data Communication Networking (DCNET)Static Analysis of Routing and Firewall Policy ConfigurationsThreshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor NetworksThe...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Berlin, Heidelberg u.a.
Springer
2012
|
Schriftenreihe: | Communications in computer and information science
222 |
Schlagworte: | |
Online Zugang: | Inhaltsverzeichnis Inhaltstext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Part 1.Invited Papere-Business Challenges and Directions: Important Themes from the First ICE-B WorkshopPart 2.Part I: Data Communication Networking (DCNET)Static Analysis of Routing and Firewall Policy ConfigurationsThreshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor NetworksThe Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSAMobile Applications Middleware for File SwappingPart 3.Part II: e-Business (ICE-B)Front matterOptimization of a Handwriting Recognition Algorithm for a Mobile Enterprise Health Information System on the Basis of Real-Life Usability ResearchA Social Location-Based Emergency Service to Eliminate the Bystander EffectPart 4.Part III: Optical Communication Systems (OPTICS)Converged Optical Networks for Multimedia Distribution and Data Services in Hospitality EnvironmentsPart 5.Part IV: Security and Cryptography (SECRYPT)Differential Resynchronization Attacks on Reduced Round SNOW 3GModelling Uncertain and Time-Dependent Security Labels in MLS SystemsSum Aggregation in Sensor Networks While Preserving Confidentiality and IntegrityStream Cipher-Based Hash Function and Its SecurityFlexible Anonymous Subscription SchemesProxiable Designated Verifier SignatureAdaptive and Composable Non-interactive String-Commitment ProtocolsDynamic Adaptation of Security and QoS in Energy-Harvesting Sensors NodesThreshold Discernible Ring SignaturesUniversally Composable Non-committing Encryptions in the Presence of Adaptive AdversariesSelectively Traceable Anonymous and Unlinkable Token-Based TransactionsAn Encryption Scheme for a Secure Policy UpdatingMachine Learning for the Detection of Spam in Twitter NetworksPart 6.Part V: Signal Processing and Multimedia Applications (SIGMAP)Front matterDeformable Multi-object Tracking Using Full Pixel Matching of ImageA Multi-sensor System for Monitoring the Performance of Elite SwimmersMaximum a Posteriori Decoding of Arithmetic Codes in Joint Source-Channel CodingAn Ensemble Approach to Improve Microaneurysm Candidate ExtractionPart 7.Part VI: Wireless Information Networks and Systems (WINSYS). |
---|---|
Beschreibung: | Literaturangaben |
Beschreibung: | XVI, 448 S. Ill., graph. darst. 24 cm |
ISBN: | 9783642252051 978-3-642-25205-1 3642252052 3-642-25205-2 |