E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper /

This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Obaidat, Mohammad S. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Cabello, Enrique (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Communications in Computer and Information Science, 990
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph
  • Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study
  • Approaches to Securing P2PSIP in MANETs
  • How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes
  • How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements
  • Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers
  • BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256
  • Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack
  • On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy
  • History-based Throttling of Distributed Denial-of-Service Attacks
  • LocalPKI: An Interoperable and IoT Friendly PKI
  • No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption
  • Computer-based Analysis of Tomatis Listening Test System Audio Data
  • Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks
  • BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application
  • Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance
  • Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare.