000782151 000__ 05103cam\a2200577Ii\4500 000782151 001__ 782151 000782151 005__ 20230306143239.0 000782151 006__ m\\\\\o\\d\\\\\\\\ 000782151 007__ cr\cn\nnnunnun 000782151 008__ 170516s2017\\\\si\a\\\\o\\\\\101\0\eng\d 000782151 019__ $$a987337486 000782151 020__ $$a9789811050411$$q(electronic book) 000782151 020__ $$a9811050414$$q(electronic book) 000782151 020__ $$z9789811050404 000782151 020__ $$z9811050406 000782151 035__ $$aSP(OCoLC)ocn987302312 000782151 035__ $$aSP(OCoLC)987302312$$z(OCoLC)987337486 000782151 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dEBLCP$$dYDX$$dOCLCF$$dUAB 000782151 049__ $$aISEA 000782151 050_4 $$aT58.5 000782151 08204 $$a004$$223 000782151 1112_ $$aFutureTech (Conference)$$n(12th :$$d2017 :$$cSeoul, Korea) 000782151 24510 $$aAdvanced multimedia and ubiquitous engineering :$$bMUE/FutureTech 2017 /$$cJames J. (Jong Hyuk) Park, Shu-Ching Chen, Kim-Kwang Raymond Choo, editors. 000782151 2463_ $$aMUE/FutureTech 2017 000782151 264_1 $$aSingapore :$$bSpringer,$$c2017. 000782151 300__ $$a1 online resource (xxx, 740 pages) :$$billustrations. 000782151 336__ $$atext$$btxt$$2rdacontent 000782151 337__ $$acomputer$$bc$$2rdamedia 000782151 338__ $$aonline resource$$bcr$$2rdacarrier 000782151 4901_ $$aLecture notes in electrical engineering,$$x1876-1100 ;$$vvolume 448 000782151 500__ $$aInternational conference proceedings. 000782151 500__ $$aIncludes author index. 000782151 5050_ $$aMessage from the FutureTech2017 General Chairs; Message from the FutureTech2017 Program Chairs; Organization; Contents; Single Password Authentication Protocol; Abstract; 1 Introduction; 2 Background and Related Work; 2.1 Password Authentication; 2.2 Single Password Protocols; 3 Proposed Authentication Scheme; 3.1 Storing Passwords; 3.2 The Protocol; 4 Security Analysis; 4.1 Compromised Password Attack; 4.2 Replay Attack; 4.3 Phishing and Man-in-the-Middle Attacks; 5 Conclusion; References; Performance Analysis of Congestion Control for Massive MTC Networks; Abstract; 1 Introduction 000782151 5058_ $$a1.1 Related Works2 Our Critical Red Method; 2.1 Congestion Point Due to Massive MTC Devices; 2.2 Critical Random Early Detection (CRED) Method; 3 Simulation; 3.1 Simulation Settings; 3.2 Throughput; 4 Conclusion; References; How to Train People to Increase Their Security Awareness in IT; Abstract; 1 Introduction; 2 Related Work; 3 Model; 3.1 Step 1 -- Defining Social Network of Co-workers; 3.2 Step 2 -- Defining the Required Costs of the Training; 3.3 Step 3 -- Defining Method of Teaching; 3.4 Step 4 -- Defining Desired Result; 3.5 Step 5 -- Evaluation of Workers Security Awareness 000782151 5058_ $$a3.6 Visualisation4 Simulations; 4.1 Case 1; 4.2 Case 2; 5 Conclusions; References; Advanced Data Communication Framework for Cloud Computing from CDMI; Abstract; 1 Introduction; 2 Cloud Storage and Data; 3 Cloud Computing Based Data Management Structure; 3.1 Data Processing in the Existing Cloud Computing; 3.2 CDMI Framework Proposal; 4 Evaluation; 5 Conclusion; References; A Study of AI Based E-learning System and Application; Abstract; 1 Introduction; 2 Relevant Previous Studies; 3 Research Methods and Procedures; 3.1 Research Panel Configuration; 3.2 Data Processing; 4 Results and Analysis 000782151 5058_ $$a5 ConclusionReferences; A Study on the Serious Issues in the Practice of Information Security in IT: With a Focus on Ransomware; Abstract; 1 Introduction; 2 Computer Virus; 3 Ransomware and Its Risk; 3.1 Ransomware; 3.2 The Risk of Ransomware; 4 Questionnaire and Evaluation; 5 Conclusion; References; Mobile App for Analyzing Environmental Visual Parameters with Life Logging Camera; Abstract; 1 Introduction; 2 Visual Parameters; 2.1 Color Analysis; 2.2 Analyzing Spatial Complexity; 3 Image Processing with Android; 4 Implementation and Feasibility Test; 5 Conclusion; Acknowledgement; References 000782151 5058_ $$aFake Fingerprint Detection Based on Statistical MomentsAbstract; 1 Introduction; 2 Proposed Method; 2.1 Feature Extractions; 2.2 Fusing Features Using SVM; 3 Experimental Results; 4 Conclusion; Acknowledgements; References; Path Planning Method for Collision Avoidance of Multiple UAVs; Abstract; 1 Introduction; 2 Multiple UAV Control for Collision Avoidance; 2.1 UAV Flight Data Records; 2.2 Path Revision Computations; 2.3 Collision Avoidance Path Planning; 3 Experiments; 3.1 Three-Dimensional Experiments Scenario and UAV Flight Data Record; 3.2 Path Revision Computation 000782151 506__ $$aAccess limited to authorized users. 000782151 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 18, 2017). 000782151 650_0 $$aInformation technology$$vCongresses. 000782151 650_0 $$aMultimedia systems$$vCongresses. 000782151 650_0 $$aUbiquitous computing$$vCongresses. 000782151 7001_ $$aPark, James J.,$$eeditor. 000782151 7001_ $$aChen, Shu-Ching,$$d1963-$$eeditor. 000782151 7001_ $$aChoo, Kim-Kwang Raymond,$$eeditor. 000782151 77608 $$iPrint version:$$z9789811050404$$z9811050406$$w(OCoLC)985080228 000782151 830_0 $$aLecture notes in electrical engineering ;$$vv. 448. 000782151 852__ $$bebk 000782151 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-5041-1$$zOnline Access$$91397441.1 000782151 909CO $$ooai:library.usi.edu:782151$$pGLOBAL_SET 000782151 980__ $$aEBOOK 000782151 980__ $$aBIB 000782151 982__ $$aEbook 000782151 983__ $$aOnline 000782151 994__ $$a92$$bISE