語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
E-Business and Telecommunications = ...
~
Obaidat, Mohammad S.
E-Business and Telecommunications = 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
E-Business and Telecommunications/ edited by Mohammad S. Obaidat, Enrique Cabello.
其他題名:
14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper /
其他作者:
Obaidat, Mohammad S.
面頁冊數:
XX, 371 p. 189 illus., 92 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer communication systems. -
電子資源:
https://doi.org/10.1007/978-3-030-11039-0
ISBN:
9783030110390
E-Business and Telecommunications = 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper /
E-Business and Telecommunications
14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper /[electronic resource] :edited by Mohammad S. Obaidat, Enrique Cabello. - 1st ed. 2019. - XX, 371 p. 189 illus., 92 illus. in color.online resource. - Communications in Computer and Information Science,9901865-0929 ;. - Communications in Computer and Information Science,498.
Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare.
This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems.
ISBN: 9783030110390
Standard No.: 10.1007/978-3-030-11039-0doiSubjects--Topical Terms:
1115394
Computer communication systems.
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
E-Business and Telecommunications = 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper /
LDR
:04139nam a22003975i 4500
001
1009399
003
DE-He213
005
20200703194314.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030110390
$9
978-3-030-11039-0
024
7
$a
10.1007/978-3-030-11039-0
$2
doi
035
$a
978-3-030-11039-0
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
245
1 0
$a
E-Business and Telecommunications
$h
[electronic resource] :
$b
14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper /
$c
edited by Mohammad S. Obaidat, Enrique Cabello.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XX, 371 p. 189 illus., 92 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
990
505
0
$a
Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare.
520
$a
This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems.
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computer system failures.
$3
782237
650
0
$a
Application software.
$3
528147
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
650
0
$a
Coding theory.
$3
561460
650
0
$a
Information theory.
$3
595305
650
1 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
System Performance and Evaluation.
$3
669346
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Coding and Information Theory.
$3
669784
700
1
$a
Obaidat, Mohammad S.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
681629
700
1
$a
Cabello, Enrique.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1198731
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030110383
776
0 8
$i
Printed edition:
$z
9783030110406
830
0
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
498
$3
1253583
856
4 0
$u
https://doi.org/10.1007/978-3-030-11039-0
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入