|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Ismail Khalil , Teddy MantoroPublisher: Atlantis Press (Zeger Karssen) Imprint: Atlantis Press (Zeger Karssen) Edition: 2012 ed. Volume: 6 Dimensions: Width: 15.50cm , Height: 1.50cm , Length: 23.50cm Weight: 0.444kg ISBN: 9789462390577ISBN 10: 9462390576 Pages: 268 Publication Date: 15 October 2014 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsThe automatic Trust Management of self-adaptive Multi-Display Environments.- Malicious Pixels – Using QR Codes as Attack Vector.- A Virtual Performance Stage as a Space for Children to Create and Perform Stories.- Network Forensics: Detection and Mitigation of Botnet and Malicious Code via Darknet.- Trusted Log Management System.- Reasoning of Collaborative Human Behaviour in Security-Critical Work Practices: A Framework.- Mitigation ofWormhole Attack in Wireless Sensor Networks.- Protocol for Secure Access in Mobile Ad-hoc Network for Emergency Services.- A Lightweight Graph-Based Pattern Recognition Scheme in Mobile Ad Hoc Networks.- Security Framework for Mobile Banking.- Anonymous, Secure and Fair Micropayment System to Access Location-Based Services.- Privacy Preserving with A Purpose-based Privacy Data Graph.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |