2nd International Conference on Wireless Intelligent and Distributed Environment for Communication WIDECOM 2019 /
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2019), sponsored by the University of Milan, Milan, Italy, February 11-13, 2019. The conference deals both with the important core and the specialized iss...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2019.
|
Έκδοση: | 1st ed. 2019. |
Σειρά: | Lecture Notes on Data Engineering and Communications Technologies,
27 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Chapter 1. Performance Evaluation of G.711 and GSM Codecs on VoIP Applications using OSPF and RIP Routing Protocols
- Chapter 2. Cyclic Redundancy Check based Data Authentication in Opportunistic Networks
- Chapter 3. Hybrid Cryptographic Based Approach for Privacy Preservation in Location Based Services
- Chapter 4. Design of Energy-Aware PRoPHET and Spray-and-Wait Routing Protocols for Opportunistic Networks
- Chapter 5.An Asymmetric RSA based Security Approach for Opportunistic IoT
- Chapter 6. Performance Analysis of A* Based Hop Selection Technique in Opportunistic Networks through Movement Mobility Models
- Chapter 7. Data Loss Prevention Using Document Semantic Signature
- Chapter 8. Data Loss Prevention Using Document Semantic Signature
- Chapter 9. PSARV: Particle Swarm Angular Routing in Vehicular Ad hoc Networks
- Chapter 10. A Reliable Firefly-based Routing Protocol for Efficient Communication in Vehicular Ad Hoc Networks
- Chapter 11. Exploring the Application of Random Sampling in Spectrum Sensing
- Chapter 12. White-box Cryptography: A Time-security Trade-off for the SPNbox Family
- Chapter 13. CESIS: Cost Effective and Self-regulating Irrigation System
- Chapter 14. Maximum Eigenvalue based detection using Jittered Random Sampling
- Chapter 15. Prevention of Flooding Attacks in Mobile Ad hoc Networks
- Chapter 16. Prevention of Flooding Attacks in Mobile Ad hoc Networks
- Chapter 17. Real Time Spectrum Occupancy Prediction
- Chapter 18. SCC-LBS: Secure Criss-Cross Location Based Service in Logistics.