It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 13780cam 2200865Ka 4500
001 ocn822030012
003 OCoLC
005 20201027180057.0
008 121219s2012 gw a ob 101 0 eng d
006 m o d
007 cr cnu---unuuu
040 $aGW5XE$beng$epn$cGW5XE$dGZM$dI9W$dYDXCP$dCOO$dZMC$dOCLCO$dNUI$dIAD$dOCLCF$dBEDGE$dOCLCO$dOCL$dOCLCO$dOCLCQ$dVT2$dESU$dOCLCQ$dIOG$dOCLCA$dBUF$dCEF$dU3W$dWYU$dYOU$dTKN$dLEAUB$dOL$$dOCLCQ$dEBLCP
066 $c(S
019 $a985053422
020 $a9783642352119$q(electronic bk.)
020 $a3642352111$q(electronic bk.)
020 $z9783642352102
024 7 $a10.1007/978-3-642-35211-9$2doi
035 $a(OCoLC)822030012$z(OCoLC)985053422
050 4 $aTK5105.59$b.I58 2012
082 04 $a005.8$223
111 2 $aNCIS (Conference)$n(2nd :$d2012 :$cShanghai, China)
245 10 $aNetwork computing and information security :$bsecond international conference, NCIS 2012, Shanghai, China, December 7-9, 2012, proceedings /$cJingsheng Lei [and others] (eds.).
246 3 $aNCIS 2012
260 $aBerlin ;$aNew York :$bSpringer,$c©2012.
300 $a1 online resource
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
490 1 $aCommunications in computer and information science,$x1865-0937 ;$v345
505 80 $6880-01$tCloud Computing --$tA Deep Understanding of Cloud Computing Security --$tStudy of Layers Construct for Data Mining Platform Based on Cloud Computing --$tCloud Task and Virtual Machine Allocation Strategy in Cloud Computing Environment --$tMethod of Construct High Performance StaaS Infrastructure Base on Dynamic Request Data Supporting Cloud Computing --$tGIS Application Model Based on Cloud Computing --$tDevelopment Framework for Cloud Services --$tResearch on Distributed File System with Hadoop --$tRequirement Uncertainty Analysis for Service-Oriented Self-Adaptation Software --$tCloud Computing --$tOptimization of Green Passive Optical Networks with Minimum Cost --$tCommunication and Information Systems --$tBased on Wavelet Packet Transform and Embedded Web Technology of Buried Water Remote Monitoring System Design and Implementation --$tPrimary Educational Resources Classification Study Based on Gagne Learning Classification Theory.
505 80 $tA Special Subject Database in CALIS Project: Database of Local Resources in the Northwestern Guangxi --$tThe Design and Implementation of Automatic Drug Matching System --$tDesign and Analysis of Cryptographic Algorithms --$tAsymmetric Encryption Scheme Based on Fingerprint Topological Transformation --$tA Kind of Digital Signature System Based on Linear Computing --$tCryptanalysis and Improvement of an Efficient Certificateless Signature Scheme --$tInformation Hiding and Watermarking --$tRobust Software Watermarking Scheme Using RC4 and HASH --$tA Novel Digital Watermarking Method Based on Lifting Wavelet Transform --$tA New Practical Template Attack of AES --$tIntelligent Networked Systems --$tMulticasting of Images Resized Using Enhanced Seam Carving Technique in Hierarchical Group Communication --$tA Relaxed Iterative Thresholding Reconstruction Algorithm Based on Compressed Sensing --$tMulti-granule Association Rule Mining Based on Quantitative Concept Lattice.
505 80 $tVisual Scene Simulation to Civil Aviation Aircraft Approaching and Landing Using Dual Fuzzy Neural Network --$tAn Intelligent Knowledge Discovery Method Based on Genetic Algorithms and Conditional Probability --$tBrushless DC Motor Speed Control System Based on Fuzzy PID Controller --$tLearning Sequent Patterns Discovery Scheme on Line --$tExtension Control and Its Application Research in Power System --$tModified Information Retrieval Model Based on Markov Network --$tIntelligent Networked Systems --$tSoftware Simulation of Lifts --$tAnalysis on Power Flow of Distribution Network with DGs --$tMultimedia Computing and Intelligence --$tAudio and Video Real Time Broadcast System Based on Android Platform --$tCritical Chain Project Scheduling Problem Based on the Thermodynamic Particle Swarm Optimization Algorithm --$tA Forgetting Scheme for Layered-Neurons Procedure.
505 80 $tNetwork and Wireless Network Security --$tA Cryptographic and Time-Constraint Access Control Scheme for Mobile Terminals --$tA Distributed Multi-secret Sharing Scheme on the (t, n) Threshold --$tExploratory Study on Campus Network Security Solutions --$tResearch and Improvement of Adjustment Algorithm of Matching Rules of Intrusion Detection --$tPrincipal Component Analysis of Network Security Data Based on Projection Pursuit --$tMulti-recipient Signcryption Algorithm for Communication of Mobile Ad Hoc Networks --$tA Survey of Research on Smart Grid Security --$tNetwork Communication --$tPerformance Analysis of the IEEE 802.16e Adaptive Cooperative ARQ Mechanism --$tThe Strategic Interaction Based on Public Goods Provision on Infinite Endogenous Plane Lattice --$tClosed Circle DNA Model to QoS Routing for Ad Hoc Networks --$tResearch and Implementation of Embedded Remote Measurement and Control System Based on Industrial Ethernet.
505 80 $tAnalysis of Time-Varying Characteristics of Internet End-to-End Network Delay --$tThe Research of Agile Web Development Process and Quality Model --$tStudy on Nonlinear Parametrically Excited Vibration in Automatic Gauge Control System of the Rolling Mill --$tStudy on Self-excited Vibration for Displacement Delayed Feedback System in the Rolling Mill Main Drive System --$tParallel and Distributed Systems --$tDetection of Abnormal Nodes in Clustered Control Systems Based on Multiagent Group Prominence Analyses --$tHeterogeneous Clustering Computing Based on Parallel Task Distribution --$tPedestrian Detection Based on Combining Classifier in Surveillance Video --$tA New Electronic Image Stabilization Technology Based on Random Ferns for Fixed Scene --$tA CPS Design Mode of Scheduling Management for Hydro-Junction Project --$tResearch on Framework of Information Security for Ship Electronic Information System --$tThe Analysis of Influencing Factors of College Students' Learning Effect in Face-to-Face, Online and Blended Learning.
505 80 $tDHT-Based Cross-Transmission Protocol Peer-to-Peer Resource Sharing Model --$tRisk Assessment for Information Security Based on Fuzzy Membership Matrix --$tNo-Reference Image Quality Assessment Based on SVM for Video Conferencing System --$tResearch on Mining Association Rules in University Scientific Projects Management --$tPublic Key Encryption with Multi-keyword Search --$tS & T Novelty Search and R & D of Removing Duplicate Software --$tOptimization Model for Three-State Devices Networks Reliability and Its Particle Swarm Optimization Algorithm --$tApplication of the Webcam for High Voltage Transmission Towers Constructing and Building --$tThe Remote Video Monitoring System Design and Development for Underground Substation Construction Process --$tModelling Emotional Agents Based on Graded BDI Architectures --$tInstrument System of Airport Fire Engine Simulator Based on Parallel Simulation Technology --$tMaterial Database Design and Realization Based on the Metadata Management of Electric Power.
505 80 $tSecurity Modeling and Architectures --$tA Strategy of Network Security Situation Autonomic Awareness --$tSecurity Modeling and Architectures --$tStuxnet Vulnerabilities Analysis of SCADA Systems --$tProbe into Digital Resources Service Model in Web3.0 --$tThe Periodicity of Nonlinear Pseudo Random Sequence Based on Latin Squares --$tSecurity Research on the Interfaces of Information Appliances Described by XML --$tResearch on Flexible Trusted Terminal Model --$tSecure Obfuscation of a Two-Step Oblivious Signature --$tA Formal Description for Multi-owner Privacy --$tSensor Network --$tA Novel Multi-channel MAC Protocol for Cluster Based Wireless Multimedia Sensor Networks --$tThe Design of Wireless Medical Monitoring Network Based on ZigBee --$tDesign and Application of ZigBee Locating and Transparent Transmission Serial Port Module for Tele-health Monitoring.
505 80 $tPower Line Short Circuit Fault Orientation System Based on Wireless Sensor Network --$tSignal and Information Processing --$tMultidimensional LDPC for the Reconciliation of the Continuous Variables Quantum Key Distribution System --$tA New Hybrid Semantic Similarity Measure Based on WordNet --$tResearch of Dynamic Axle Load Truck Scale Sampling Data Selection Method --$tVirtualization Techniques and Applications --$tA New Method of Smoothing of Boolean Operations of Surfaces --$tPerformance Evaluation of Virtualization Technologies for Windows Programs Running on Linux Operating System --$tA Replica Management Strategy of Hybrid P2P Network for Massive Terrain Data --$tWireless Network --$tThe Application of LBS Based on Android --$tResearch on 3G Application with NFC --$tShort-Term BF Research on TD-LTE System --$tWireless Network --$tBuilding M-Learning System Based on Wireless Network in Colleges --$tMobility Support in OLSR Routing Protocol --$tAn Efficient and Rapid Address Assignment Algorithm for LR-WPAN Meshes --$tA RF Repeater for Low Data Rate Communication.
504 $aIncludes bibliographical references and author index.
588 0 $aPrint version record.
505 0 $aApplications of Cryptography -- Authentication and Non-repudiation -- Cloud Computing -- Communication and Information Systems -- Design and Analysis of Cryptographic Algorithms -- Information Hiding and Watermarking -- Intelligent Networked Systems -- Multimedia Computing and Intelligence -- Network and Wireless Network Security -- Network Communication -- Parallel and Distributed Systems -- Security Modeling and Architectures -- Sensor Network -- Signal and Information Processing -- Virtualization Techniques and Applications -- Wireless Network.
520 $aThis book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.
650 0 $aComputer networks$xSecurity measures$vCongresses.
650 0 $aComputer security$vCongresses.
650 0 $aData encryption (Computer science)$vCongresses.
650 7 $aInformatique.$2eclas
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aData encryption (Computer science)$2fast$0(OCoLC)fst00887935
655 0 $aElectronic books.
655 4 $aElectronic books.
655 7 $aConference papers and proceedings.$2fast$0(OCoLC)fst01423772
700 1 $aLei, Jingsheng.
776 08 $iPrint version:$tNetwork computing and information security.$d[S.l.] : Springer, 2012$z3642352103$w(OCoLC)816512493
830 0 $aCommunications in computer and information science ;$v345.$x1865-0929
856 40 $3SpringerLink$uhttps://doi.org/10.1007/978-3-642-35211-9
856 40 $3SpringerLink$uhttps://link.springer.com/book/10.1007/978-3-642-35210-2
856 40 $3SpringerLink$uhttps://link.springer.com/book/10.1007/978-3-642-35211-9
856 40 $3Scholars Portal$uhttp://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks2/springer/2013-02-14/1/9783642352119
856 40 $3Scholars Portal Books$uhttp://www.library.yorku.ca/e/resolver/id/2487901
856 40 $3SpringerLink$uhttp://www.library.yorku.ca/e/resolver/id/2487902
856 40 $3SpringerLink$uhttp://dx.doi.org.ezproxy.aub.edu.lb/10.1007/978-3-642-35211-9$zClick for electronic access to e-book (off-campus access)
856 40 $zClick here to view book$uhttp://public.eblib.com/choice/PublicFullRecord.aspx?p=6296466
880 00 $6505-01/(S$tApplications of Cryptography --$tOn the Isomorphism Classes of Elliptic Curves with 2-Torsion Points --$tTemplate-Based and Second-Order Differential Power Analysis Attacks on Masking --$tDesign and Implementation of Linux File Mandatory Access Control --$tAuthentication and Non-repudiation --$tDesign and Application of Fine-Grained Access Control Model --$tIntel SYSRET Privilege Escalation Vulnerability Analysis --$tAnalysis of Cloud Security and a Reliable Transmission Based on UDP --$tA Survey of Passive Image Forensics --$tA Novel Fast η -Adapt Slide Window Elliptic Curve Cryptography Algorithm --$tApplication of Neural Network and Cluster Analysis in Anomaly Detection --$tClustering System Call Arguments for Remote Attestation --$tDocument Selective Protection Based on Third Service Framework --$tFine-Grain Trusted Storage and Transitivity Policy for Open Network Environment.
938 $aProQuest Ebook Central$bEBLB$nEBL6296466
938 $aYBP Library Services$bYANK$n9991582
029 1 $aAU@$b000050544466
029 1 $aAU@$b000058378154
029 1 $aDKDLA$b820120-katalog:000661404
029 1 $aNLGGC$b357211308
029 1 $aNZ1$b14831052
029 1 $aNZ1$b15745701
029 1 $aAU@$b000060366683
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 333 OTHER HOLDINGS