Catálogo de publicaciones - libros
Computational Intelligence in Information Assurance and Security
Nadia Nedjah ; Ajith Abraham ; Luiza de Macedo Mourelle (eds.)
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Appl.Mathematics/Computational Methods of Engineering; Artificial Intelligence (incl. Robotics)
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-71077-6
ISBN electrónico
978-3-540-71078-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2007
Cobertura temática
Tabla de contenidos
Cryptography and Cryptanalysis Through Computational Intelligence
E. C. Laskari; G. C. Meletiou; Y. C. Stamatiou; M. N. Vrahatis
Palabras clave: Boolean Function; Elliptic Curve; Elliptic Curf; Advance Encryption Standard; Discrete Logarithm.
Pp. 1-49
Multimedia Content Protection Based on Chaotic Neural Networks
Shiguo Lian
Palabras clave: Hash Function; Encryption Algorithm; Block Cipher; Cellular Neural Network; Stream Cipher.
Pp. 51-78
Evolutionary Regular Substitution Boxes
Nadia Nedjah; Luiza de Macedo Mourelle
Palabras clave: Nash Equilibrium; Boolean Function; Block Cipher; Advance Encryption Standard; Nash Equilibrium Strategy.
Pp. 79-88
Industrial Applications Using Wavelet Packets for Gross Error Detection
Paolo Mercorelli; Alexander Frick
Palabras clave: Outlier Detection; Lipschitz Constant; Wavelet Packet; Median Absolute Deviation; Quality Module.
Pp. 89-127
Immune-inspired Algorithm for Anomaly Detection
Ki-Won Yeom
Palabras clave: Major Histocompatibility Complex; Major Histocompatibility Complex Class; Intrusion Detection; Danger Signal; Intrusion Detection System.
Pp. 129-154
How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality
Luc Longpré; Vladik Kreinovich
Palabras clave: Fuzzy Number; Interval Computation; Cauchy Distribution; Reliable Computing; Processing Uncertainty.
Pp. 155-173
Fingerprint Recognition Using a Hierarchical Approach
Chengfeng Wang; Yuan Luo; Marina L. Gavrilova; Jon Rokne
Palabras clave: Singular Point; Input Image; Voronoi Diagram; Delaunay Triangulation; Hierarchical Approach.
Pp. 175-199
Smart Card Security
Kostas Markantonakis; Keith Mayes; Michael Tunstall; Damien Sauveron; Fred Piper
Palabras clave: Virtual Machine; Smart Card; Advanced Encryption Standard; Visitor Location Register; Read Only Memory.
Pp. 201-233
Governance of Information Security: New Paradigm of Security Management
Sangkyun Kim
Palabras clave: Corporate Governance; Information Security; Success Factor; Computer Security; Governance Institute.
Pp. 235-254