000724074 000__ 05892cam\a2200577Ii\4500 000724074 001__ 724074 000724074 005__ 20230306140418.0 000724074 006__ m\\\\\o\\d\\\\\\\\ 000724074 007__ cr\cn\nnnunnun 000724074 008__ 141105t20142015sz\a\\\\o\\\\\101\0\eng\d 000724074 019__ $$a908086411 000724074 020__ $$a9783319120126$$qelectronic book 000724074 020__ $$a3319120123$$qelectronic book 000724074 020__ $$z9783319120119 000724074 035__ $$aSP(OCoLC)ocn894509500 000724074 035__ $$aSP(OCoLC)894509500$$z(OCoLC)908086411 000724074 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dOCLCF$$dIDEBK$$dEBLCP$$dOCLCO 000724074 049__ $$aISEA 000724074 050_4 $$aQ334 000724074 08204 $$a006.3$$223 000724074 1112_ $$aInternational Conference on Frontiers of Intelligent Computing: Theory and Applications$$n(3rd :$$d2014 :$$cBhubaneswar, India) 000724074 24510 $$aProceedings of the 3rd International Conference on Frontiers of Intelligent Computing$$h[electronic resource] :$$bTheory and Applications (FICTA) 2014.$$nVolume 2 /$$cSuresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Udgata, J. K. Mandal, editors. 000724074 264_1 $$aCham :$$bSpringer,$$c[2014] 000724074 264_4 $$c©2015 000724074 300__ $$a1 online resource (xviii, 805 pages) :$$billustrations. 000724074 336__ $$atext$$btxt$$2rdacontent 000724074 337__ $$acomputer$$bc$$2rdamedia 000724074 338__ $$aonline resource$$bcr$$2rdacarrier 000724074 4901_ $$aAdvances in Intelligent Systems and Computing,$$x2194-5357 ;$$vvolume 328 000724074 500__ $$aIncludes author index. 000724074 5050_ $$aPreface; Organization; Contents; Security and Privacy in Cloud Computing: A Survey; 1 Introduction; 2 Challenges to Security and Privacy; 2.1 Privacy Issues; 2.2 Security Issues; 3 Existing Solutions and Open Issues to Security and Privacy; 3.1 Client Based Privacy Manager; 4 Open Research Problem; 5 Conclusion; References; Analysis of Secret Key Revealing Trojan Using Path Delay Analysis for Some Cryptocores; 1 Introduction; 2 Hardware Trojan Horses; 3 Cryptocores; 3.1 Advanced Encryption Standard (AES); 3.2 Data Encryption Standard (DES); 4 Design and Analysis of Trojan on Cryptocores 000724074 5058_ $$a5 Implementation and Results6 Future Work; 7 Conclusion; References; Generating Digital Signature Using DNA Coding; 1 Introduction; 2 Related Work; 3 Proposed Work; 3.1 Digital Signature; 3.2 Sharing Symmetric Key Using Public Key Cryptography; Results; 5 Conclusion; References; DNA Encryption Based Dual Server Password Authentication; 1 Introduction; 2 Related Work; 3 Proposed System; 3.1 ElGamal Encryption/Decryption Algorithm [10]; 3.2 DNA Encryption/Decryption Algorithm; 4 Result Analysis; 4.1 Security against Brute-Force Attack; 5 Conclusion; References 000724074 5058_ $$aDynamic Cost-Aware Re-replication and Rebalancing Strategy in Cloud System1 Introduction; 2 Related Work; 3 System Model; 4 Dynamic Cost-Aware Re-replication and Rebalancing Strategy; 5 Simulation; 6 Conclusions and Future Scope; References; Signalling Cost Analysis of Community Model; 1 Introduction; 2 Related Work; 3 Signalling Cost Estimation of Community Model; 3.1 Mathematical Formulation for Signalling Cost; 3.2 Algorithm for Signalling Cost; 4 Performance Analysis; 5 Conclusion; References; Steganography with Cryptography in Android; 1 Introduction 000724074 5058_ $$a1.1 Advanced Encryption Standards (AES)1.2 Ron Rivest, AdiShamir, Leonard Adleman (RSA):; 1.3 Steganography (LSB); 2 Problem Definition; 3 Related Work; 4 Proposed System Architecture; 4.1 Public Key and Private Key Generation and Transfer; 4.2 Encryption Phase; 4.3 Decryption Phase; 5 Future Scope; 6 Applications; 7 Conclusion; References; A Cloud Based Architecture of Existing e-District Project in India towards Cost Effective e-Governance Implementation; 1 Introduction; 2 Literature Review; 3 Methodology; 4 Reason to OPT IaaS in e-District Project 000724074 5058_ $$a5 Existing e-District Project Delivery Model6 Proposed Cloud Based e-District Project Architecture; 7 Conclusion; References; A Chaotic Substitution Based Image Encryption Using APA-transformation; 1 Introduction; 2 Preliminaries; 2.1 Chaotic Logistic Map; 2.2 APA-transformation; 2.3 Keyed Latin Square; 2.4 Substitution Boxes; 3 Proposed Algorithm; 4 Simulation Results; 5 Conclusion; References; Security, Trust and Implementation Limitations of Prominent IoT Platforms; 1 Introduction; 2 IoT Middleware Platform / Framework Comparison; 3 Related Work; 4 IoT Middleware Platforms/Framework Used 000724074 506__ $$aAccess limited to authorized users. 000724074 520__ $$aThis volume contains 87 papers presented at FICTA 2014: Third International Conference on Frontiers in Intelligent Computing: Theory and Applications. The conference was held during 14-15, November, 2014 at Bhubaneswar, Odisha, India. This volume contains papers mainly focused on Network and Information Security, Grid Computing and Clod Computing, Cyber Security and Digital Forensics, Computer Vision, Signal, Image & Video Processing, Software Engineering in Multidisciplinary Domains and Ad-hoc and Wireless Sensor Networks. 000724074 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 21, 2014). 000724074 650_0 $$aArtificial intelligence$$vCongresses. 000724074 650_0 $$aComputational intelligence$$vCongresses. 000724074 650_0 $$aMachine learning$$vCongresses. 000724074 7001_ $$aSatapathy, Suresh Chandra,$$eeditor. 000724074 7001_ $$aBiswal, Bhabendra Narayan,$$eeditor. 000724074 7001_ $$aUdgata, Siba K.,$$eeditor. 000724074 7001_ $$aMandal, J. K.,$$eeditor. 000724074 77608 $$iPrint version:$$aSatapathy, Suresh Chandra$$tProceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014$$dCham : Springer International Publishing,c2014$$z9783319120119 000724074 830_0 $$aAdvances in intelligent systems and computing ;$$vvolume 328. 000724074 852__ $$bebk 000724074 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-12012-6$$zOnline Access$$91397441.1 000724074 909CO $$ooai:library.usi.edu:724074$$pGLOBAL_SET 000724074 980__ $$aEBOOK 000724074 980__ $$aBIB 000724074 982__ $$aEbook 000724074 983__ $$aOnline 000724074 994__ $$a92$$bISE