You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.
This book constitutes the refereed proceedings of the 5th EAI International Conference on Cognitive Computing and Cyber Physical Systems, IC4S 2024, held in Bhimavaram, India, during April 5-7, 2024. The 102 full papers presented were carefully reviewed and selected from 266 submissions. The proceedings focus on Cyber-physical systems, cognitive computing, Internet of Things, Smart grid, Security and trust management of CPS, Industrial IoT, Autonomous systems, Intelligent Transportation, Human-Machine Interaction, Distributed robotics, Sensor-based communication.
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: • Network and Wireless N...
This volume is the second part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 72 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on database and information systems; distributed software development; human computer interaction and interface; ICT; internet and Web computing; mobile computing; multi agent systems; multimedia and video systems; parallel and distributed algorithms; security, trust and privacy.
The four-volume set LNCS 8117-8120 constitutes the refereed proceedings of the 14th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2013, held in Cape Town, South Africa, in September 2013. The fourth volume includes 38 regular papers organized in topical sections on supporting physical activity, supporting shred activities, sustainability, tabletop computing, text comprehensibility, tracking eyes and head, usability evaluation and technology acceptance, user preferences and behaviour, user requirements capture and analysis, UX in work / educational context, voice / sound-based computing, 31 interactive posters, 2 industrial papers, 4 panels, 1 contribution on special interest groups, 1 tutorial, and 9 workshop papers.
This volume is the third part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 70 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on security, trust and privacy; sensor networks; signal and image processing; soft computing techniques; system software; vehicular communications networks.
Collection of pictures dated from early 1950s to 1999 which later constituted a photographic exhibition.
General articles on Indian Muslims.