語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of International Conference on Network Security and Blockchain Technology = ICNSBT 2021 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Proceedings of International Conference on Network Security and Blockchain Technology/ edited by Debasis Giri, Jyotsna Kumar Mandal, Kouichi Sakurai, Debashis De.
其他題名:
ICNSBT 2021 /
其他作者:
De, Debashis.
面頁冊數:
XIII, 406 p. 171 illus., 125 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Artificial Intelligence. -
電子資源:
https://doi.org/10.1007/978-981-19-3182-6
ISBN:
9789811931826
Proceedings of International Conference on Network Security and Blockchain Technology = ICNSBT 2021 /
Proceedings of International Conference on Network Security and Blockchain Technology
ICNSBT 2021 /[electronic resource] :edited by Debasis Giri, Jyotsna Kumar Mandal, Kouichi Sakurai, Debashis De. - 1st ed. 2022. - XIII, 406 p. 171 illus., 125 illus. in color.online resource. - Lecture Notes in Networks and Systems,4812367-3389 ;. - Lecture Notes in Networks and Systems,1.
Cyber-Defense Mechanism Considering Incomplete Information Using POMDP -- Monitoring, Recognition and Attendance Automation in Online Class: Combination of Image Processing, Cryptography in IoT Security -- Cyber Threat Phylogeny Assessment and vulnerabilities representation at thermal power station -- A novel data encryption technique based on DNA sequence -- Continuous Behavioral Authentication System for IoT Enabled Applications -- A secure 'e-Tendering' application based on secret image sharing -- Video based Graphical password authentication system -- Designing Robust Blind Color Image Watermarking-Based Authentication Scheme for Copyright Protection -- LSB Steganography using Three level Arnold Scrambling and Pseudo-Random Generator -- Part I: Network, Network Security and their Applications -- Performance Analysis of Retrial Queueing System in Wireless Local Area Network -- IBDNA –An Improved BDNA Algorithm Incorporating Huffman Coding Technique -- Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric -- Mobile Operating System (Android) Vulnerability Analysis using Machine Learning -- Survey of Predictive Autoscaling and Security of Cloud Resources using Artificial Neural Networks -- Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkwe -- A Survey on Interoperability Issues at the SaaS Level Influencing the Adoption of Cloud Computing Technology -- Human Recognition based Decision Virtualization for Effecting Safety-as-a-Service using IoT Enabled Automated UV-C Sanitization System -- Part II: Blockchain Technology and its Applications -- Security Optimization of Resource-Constrained Internet of Healthcare Things (IoHT) Devices Using Asymmetric Cryptography for Blockchain Network -- Preserving Privacy using Blockchain Technology in Autonomous Vehicles -- Security Protocols for Blockchain Based Access Control in VANETS -- LIVECHAIN: Lightweight Blockchain for IOT Devices and it's Security -- Secure and scalable Attribute Based Access Control scheme for healthcare data on Blockchain platform -- Adaptive Neuro Fuzzy Inference System for Monitoring Activities in Electric Vehicles through a Hybrid Approach and Blockchain Technology -- Application of BLOCKCHAIN in Agriculture: An Instance of Secure Financial Service in Farming -- Adaptive Electronic Health Records Management And Secure Distribution Using Blockchain -- Non-Content Message Masking Model for Healthcare Data in Edge-IoT Ecosystem using Blockchain -- Voting based Consensus protocol for blockchain to maintain COVID patient records in Consortium Networks -- Blockchain Adaptation in Healthcare: SWOT Analysis -- Blockchain-IoT based Blood Supply Chain Management System -- Blockchain based COVID-19 Detection Framework Using Federated Deep Learning -- Systematic Review of Attribute-Based Access Control for a Smart City using Blockchain -- A methodical study on Blockchain technology.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India—Kolkata Chapter, India, during December 2–4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.
ISBN: 9789811931826
Standard No.: 10.1007/978-981-19-3182-6doiSubjects--Topical Terms:
646849
Artificial Intelligence.
LC Class. No.: TK5101-5105.9
Dewey Class. No.: 621.382
Proceedings of International Conference on Network Security and Blockchain Technology = ICNSBT 2021 /
LDR
:04954nam a22003975i 4500
001
1087378
003
DE-He213
005
20220614050655.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811931826
$9
978-981-19-3182-6
024
7
$a
10.1007/978-981-19-3182-6
$2
doi
035
$a
978-981-19-3182-6
050
4
$a
TK5101-5105.9
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
621.382
$2
23
245
1 0
$a
Proceedings of International Conference on Network Security and Blockchain Technology
$h
[electronic resource] :
$b
ICNSBT 2021 /
$c
edited by Debasis Giri, Jyotsna Kumar Mandal, Kouichi Sakurai, Debashis De.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
XIII, 406 p. 171 illus., 125 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes in Networks and Systems,
$x
2367-3389 ;
$v
481
505
0
$a
Cyber-Defense Mechanism Considering Incomplete Information Using POMDP -- Monitoring, Recognition and Attendance Automation in Online Class: Combination of Image Processing, Cryptography in IoT Security -- Cyber Threat Phylogeny Assessment and vulnerabilities representation at thermal power station -- A novel data encryption technique based on DNA sequence -- Continuous Behavioral Authentication System for IoT Enabled Applications -- A secure 'e-Tendering' application based on secret image sharing -- Video based Graphical password authentication system -- Designing Robust Blind Color Image Watermarking-Based Authentication Scheme for Copyright Protection -- LSB Steganography using Three level Arnold Scrambling and Pseudo-Random Generator -- Part I: Network, Network Security and their Applications -- Performance Analysis of Retrial Queueing System in Wireless Local Area Network -- IBDNA –An Improved BDNA Algorithm Incorporating Huffman Coding Technique -- Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric -- Mobile Operating System (Android) Vulnerability Analysis using Machine Learning -- Survey of Predictive Autoscaling and Security of Cloud Resources using Artificial Neural Networks -- Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkwe -- A Survey on Interoperability Issues at the SaaS Level Influencing the Adoption of Cloud Computing Technology -- Human Recognition based Decision Virtualization for Effecting Safety-as-a-Service using IoT Enabled Automated UV-C Sanitization System -- Part II: Blockchain Technology and its Applications -- Security Optimization of Resource-Constrained Internet of Healthcare Things (IoHT) Devices Using Asymmetric Cryptography for Blockchain Network -- Preserving Privacy using Blockchain Technology in Autonomous Vehicles -- Security Protocols for Blockchain Based Access Control in VANETS -- LIVECHAIN: Lightweight Blockchain for IOT Devices and it's Security -- Secure and scalable Attribute Based Access Control scheme for healthcare data on Blockchain platform -- Adaptive Neuro Fuzzy Inference System for Monitoring Activities in Electric Vehicles through a Hybrid Approach and Blockchain Technology -- Application of BLOCKCHAIN in Agriculture: An Instance of Secure Financial Service in Farming -- Adaptive Electronic Health Records Management And Secure Distribution Using Blockchain -- Non-Content Message Masking Model for Healthcare Data in Edge-IoT Ecosystem using Blockchain -- Voting based Consensus protocol for blockchain to maintain COVID patient records in Consortium Networks -- Blockchain Adaptation in Healthcare: SWOT Analysis -- Blockchain-IoT based Blood Supply Chain Management System -- Blockchain based COVID-19 Detection Framework Using Federated Deep Learning -- Systematic Review of Attribute-Based Access Control for a Smart City using Blockchain -- A methodical study on Blockchain technology.
520
$a
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India—Kolkata Chapter, India, during December 2–4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Blockchain.
$3
1387659
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
1 4
$a
Communications Engineering, Networks.
$3
669809
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Blockchains (Databases).
$3
1372176
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Cryptography.
$3
567927
650
0
$a
Computer networks—Security measures.
$3
1366173
650
0
$a
Telecommunication.
$3
568341
700
1
$a
De, Debashis.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
768694
700
1
$a
Sakurai, Kouichi.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1279711
700
1
$a
Mandal, Jyotsna Kumar.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1208238
700
1
$a
Giri, Debasis.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1141149
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811931819
776
0 8
$i
Printed edition:
$z
9789811931833
830
0
$a
Lecture Notes in Networks and Systems,
$x
2367-3370 ;
$v
1
$3
1267315
856
4 0
$u
https://doi.org/10.1007/978-981-19-3182-6
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入