000 06622nam a22006735i 4500
001 978-3-319-90775-8
003 DE-He213
005 20210201191428.0
007 cr nn 008mamaa
008 180508s2018 gw | s |||| 0|eng d
020 _a9783319907758
_9978-3-319-90775-8
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aMobile Networks and Management
_h[electronic resource] :
_b9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings /
_cedited by Jiankun Hu, Ibrahim Khalil, Zahir Tari, Sheng Wen.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXIII, 392 p. 112 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v235
500 _aAcceso multiusuario
505 0 _aOffloading of Fog Data Networks with Network Coded Cooperative D2D Communications -- Persistent vs Service IDs in Android: Session Fingerprinting from Apps -- Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques -- Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework -- Robust Fingerprint Matching Based on Convolutional Neural Networks -- A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data -- Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling -- Factor Effects for Routing in a Delay-tolerant Wireless Sensor Network for Lake Environment Monitoring -- Estimating public opinion in social media content using aspect-based opinion mining -- A Robust Contactless Fingerprint Enhancement Algorithm -- Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning -- A Variant of BLS Signature Scheme With Tight Security Reduction -- Quantum authentication scheme based on fingerprintencoded graph states -- Cooperative Information Security/ Cybersecurity Curriculum Development -- An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks -- Homomorphic Evaluation of Database Queries -- A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks -- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources -- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs -- Performance Assessment of Cloud Migrations from Network and Application Point of View -- A Cloud Service Enhanced Method Supporting Context-aware Applications -- Application of 3D Delaunay Triangulation in Fingerprint Authentication System -- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources -- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs -- Performance Assessment of Cloud Migrations from Network and Application Point of View -- A Cloud Service Enhanced Method Supporting Context-aware Applications -- Application of 3D Delaunay Triangulation in Fingerprint Authentication System -- The Public Verifiability of Public Key Encryption with Keyword Search -- Malicious Bitcoin Transaction Tracing Using Incidence -- Relation Clustering -- Cryptanalysis of Salsa and ChaCha: Revisited -- CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains -- Probability Risk Identification Based Intrusion Detection System for SCADA Systems -- Anonymizing k-NN Classification on MapReduce -- A Cancellable Ranking based Hashing Method for Fingerprint Template Protection.
520 _aThis book constitutes the refereed post-conference proceedings of the 9th International Conference on Mobile Networks and Management, MONAMI 2017, held in Melbourne, Australia, in December 2017. The 30 revised full papers were carefully reviewed and selected from 43 submissions. The papers handle topics in the area of mobile computing, wireless networking and management.
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aComputers and civilization.
650 0 _aApplication software.
650 0 _aSpecial purpose computers.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer Communication Networks.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I13022
650 2 4 _aSystems and Data Security.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28060
650 2 4 _aComputers and Society.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I24040
650 2 4 _aInformation Systems Applications (incl. Internet).
_0https://scigraph.springernature.com/ontologies/product-market-codes/I18040
650 2 4 _aSpecial Purpose and Application-Based Systems.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I13030
650 2 4 _aCryptology.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28020
700 1 _aHu, Jiankun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKhalil, Ibrahim.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aTari, Zahir.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWen, Sheng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319907741
776 0 8 _iPrinted edition:
_z9783319907765
830 0 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v235
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-90775-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNS
942 _cLIBRO_ELEC
999 _c243396
_d243395