Linked e-resources

Details

Message from the FutureTech2017 General Chairs; Message from the FutureTech2017 Program Chairs; Organization; Contents; Single Password Authentication Protocol; Abstract; 1 Introduction; 2 Background and Related Work; 2.1 Password Authentication; 2.2 Single Password Protocols; 3 Proposed Authentication Scheme; 3.1 Storing Passwords; 3.2 The Protocol; 4 Security Analysis; 4.1 Compromised Password Attack; 4.2 Replay Attack; 4.3 Phishing and Man-in-the-Middle Attacks; 5 Conclusion; References; Performance Analysis of Congestion Control for Massive MTC Networks; Abstract; 1 Introduction

1.1 Related Works2 Our Critical Red Method; 2.1 Congestion Point Due to Massive MTC Devices; 2.2 Critical Random Early Detection (CRED) Method; 3 Simulation; 3.1 Simulation Settings; 3.2 Throughput; 4 Conclusion; References; How to Train People to Increase Their Security Awareness in IT; Abstract; 1 Introduction; 2 Related Work; 3 Model; 3.1 Step 1
Defining Social Network of Co-workers; 3.2 Step 2
Defining the Required Costs of the Training; 3.3 Step 3
Defining Method of Teaching; 3.4 Step 4
Defining Desired Result; 3.5 Step 5
Evaluation of Workers Security Awareness

3.6 Visualisation4 Simulations; 4.1 Case 1; 4.2 Case 2; 5 Conclusions; References; Advanced Data Communication Framework for Cloud Computing from CDMI; Abstract; 1 Introduction; 2 Cloud Storage and Data; 3 Cloud Computing Based Data Management Structure; 3.1 Data Processing in the Existing Cloud Computing; 3.2 CDMI Framework Proposal; 4 Evaluation; 5 Conclusion; References; A Study of AI Based E-learning System and Application; Abstract; 1 Introduction; 2 Relevant Previous Studies; 3 Research Methods and Procedures; 3.1 Research Panel Configuration; 3.2 Data Processing; 4 Results and Analysis

5 ConclusionReferences; A Study on the Serious Issues in the Practice of Information Security in IT: With a Focus on Ransomware; Abstract; 1 Introduction; 2 Computer Virus; 3 Ransomware and Its Risk; 3.1 Ransomware; 3.2 The Risk of Ransomware; 4 Questionnaire and Evaluation; 5 Conclusion; References; Mobile App for Analyzing Environmental Visual Parameters with Life Logging Camera; Abstract; 1 Introduction; 2 Visual Parameters; 2.1 Color Analysis; 2.2 Analyzing Spatial Complexity; 3 Image Processing with Android; 4 Implementation and Feasibility Test; 5 Conclusion; Acknowledgement; References

Fake Fingerprint Detection Based on Statistical MomentsAbstract; 1 Introduction; 2 Proposed Method; 2.1 Feature Extractions; 2.2 Fusing Features Using SVM; 3 Experimental Results; 4 Conclusion; Acknowledgements; References; Path Planning Method for Collision Avoidance of Multiple UAVs; Abstract; 1 Introduction; 2 Multiple UAV Control for Collision Avoidance; 2.1 UAV Flight Data Records; 2.2 Path Revision Computations; 2.3 Collision Avoidance Path Planning; 3 Experiments; 3.1 Three-Dimensional Experiments Scenario and UAV Flight Data Record; 3.2 Path Revision Computation

Browse Subjects

Show more subjects...

Statistics

from
to
Export