Catálogo de publicaciones - libros

Compartir en
redes sociales


Computational Intelligence in Information Assurance and Security

Nadia Nedjah ; Ajith Abraham ; Luiza de Macedo Mourelle (eds.)

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Appl.Mathematics/Computational Methods of Engineering; Artificial Intelligence (incl. Robotics)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-71077-6

ISBN electrónico

978-3-540-71078-3

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Cryptography and Cryptanalysis Through Computational Intelligence

E. C. Laskari; G. C. Meletiou; Y. C. Stamatiou; M. N. Vrahatis

Palabras clave: Boolean Function; Elliptic Curve; Elliptic Curf; Advance Encryption Standard; Discrete Logarithm.

Pp. 1-49

Multimedia Content Protection Based on Chaotic Neural Networks

Shiguo Lian

Palabras clave: Hash Function; Encryption Algorithm; Block Cipher; Cellular Neural Network; Stream Cipher.

Pp. 51-78

Evolutionary Regular Substitution Boxes

Nadia Nedjah; Luiza de Macedo Mourelle

Palabras clave: Nash Equilibrium; Boolean Function; Block Cipher; Advance Encryption Standard; Nash Equilibrium Strategy.

Pp. 79-88

Industrial Applications Using Wavelet Packets for Gross Error Detection

Paolo Mercorelli; Alexander Frick

Palabras clave: Outlier Detection; Lipschitz Constant; Wavelet Packet; Median Absolute Deviation; Quality Module.

Pp. 89-127

Immune-inspired Algorithm for Anomaly Detection

Ki-Won Yeom

Palabras clave: Major Histocompatibility Complex; Major Histocompatibility Complex Class; Intrusion Detection; Danger Signal; Intrusion Detection System.

Pp. 129-154

How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality

Luc Longpré; Vladik Kreinovich

Palabras clave: Fuzzy Number; Interval Computation; Cauchy Distribution; Reliable Computing; Processing Uncertainty.

Pp. 155-173

Fingerprint Recognition Using a Hierarchical Approach

Chengfeng Wang; Yuan Luo; Marina L. Gavrilova; Jon Rokne

Palabras clave: Singular Point; Input Image; Voronoi Diagram; Delaunay Triangulation; Hierarchical Approach.

Pp. 175-199

Smart Card Security

Kostas Markantonakis; Keith Mayes; Michael Tunstall; Damien Sauveron; Fred Piper

Palabras clave: Virtual Machine; Smart Card; Advanced Encryption Standard; Visitor Location Register; Read Only Memory.

Pp. 201-233

Governance of Information Security: New Paradigm of Security Management

Sangkyun Kim

Palabras clave: Corporate Governance; Information Security; Success Factor; Computer Security; Governance Institute.

Pp. 235-254