Advances in security, networks, and Internet of Things : proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 / Kevin Daimi, Hamid R. Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti, editors.

The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20)...

Full description

Saved in:
Bibliographic Details
Corporate Authors: SAM (Conference : Computer Security) Las Vegas, Nev. ; Online), ICWN (Conference), ICOMP (Conference), ESCS (Conference)
Other Authors: Daimi, Kevin, Arabnia, Hamid, Deligiannidis, Leonidas, Hwang, Min-Shiang, Tinetti, Fernando G.
Format: Conference Proceeding Electronic eBook
Language:English
Published: Cham, Switzerland : Springer, 2021.
Series:Transactions on computational science and computational intelligence.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 a 4500
001 on1260348476
003 OCoLC
005 20240402213017.0
006 m o d
007 cr un|---aucuu
008 210717s2021 sz o 101 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d GW5XE  |d YDX  |d OCLCO  |d OCLCF  |d DCT  |d UKAHL  |d COM  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1260192832  |a 1266812272 
020 |a 9783030710170  |q (electronic bk.) 
020 |a 3030710173  |q (electronic bk.) 
020 |z 9783030710163  |q (print) 
020 |z 3030710165 
024 7 |a 10.1007/978-3-030-71017-0  |2 doi 
035 |a (OCoLC)1260348476  |z (OCoLC)1260192832  |z (OCoLC)1266812272 
037 |b Springer 
050 4 |a QA76.9.A25 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
072 7 |a TJK  |2 thema 
049 |a HCDD 
111 2 |a SAM (Conference : Computer Security)  |d (2020 :  |c Las Vegas, Nev. ; Online) 
245 1 0 |a Advances in security, networks, and Internet of Things :  |b proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 /  |c Kevin Daimi, Hamid R. Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti, editors. 
260 |a Cham, Switzerland :  |b Springer,  |c 2021. 
300 |a 1 online resource (854 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
490 1 |a Transactions on computational science and computational Intelligence. 
505 0 |a Intro -- Preface -- Security and Management -- SAM 2020 -- Program Committee -- Wireless Networks -- ICWN 2020 -- Program Committee -- Internet Computing & IoT -- ICOMP 2020 -- Program Committee -- Embedded Systems, Cyber-physical Systems, & Applications -- ESCS 2020 -- Program Committee -- Contents -- Part I Authentication, Biometrics, and Cryptographic Technologies -- Statistical Analysis of Prime Number Generators Putting Encryption at Risk -- 1 Introduction -- 2 Related Work and Basics -- 2.1 Deterministic RNG -- 2.2 Non-deterministic RNG -- 2.3 Prime Number Generator 
505 8 |a 2.4 Evaluation of PRNG -- 3 Statistical Analysis -- 3.1 Largest and Smallest Prime Numbers -- 3.2 Mean Value of Prime Numbers -- 3.3 Standard Deviation of Prime Numbers -- 3.4 Largest and Smallest Prime Distances -- 3.5 Maximum Distance -- 3.6 Mean Value of Prime Distances -- 3.7 Standard Deviation of Prime Distances -- 4 Occurrence of Primes Near the Threshold Values -- 5 Occurrence of Distances Near the Threshold Values -- 6 Patterns Within Primes -- 7 Searching for Last Digits -- 8 Benefits from the Statistics -- 9 Conclusions -- References 
505 8 |a Secure Authentication Protocol for Drones in LTE Networks -- 1 Introduction -- 2 Related Works -- 3 LTE Drone Control System -- 3.1 General System Architecture -- 3.2 LTE Authentication Protocol -- 3.3 Security Analysis -- 4 Proposed Protocol -- 4.1 Architecture of Proposed Protocol -- 4.2 Phase of Proposed Protocol -- 4.3 Security Analysis of Proposed Protocol -- 5 Formal Analysis -- 5.1 Protocol Verification Tool : Scyther -- 5.2 Specification -- 5.3 Analysis of the Verification Results -- 6 Conclusion -- References -- Memorable Password Generation with AES in ECB Mode -- 1 Introduction 
505 8 |a 2 Concerns -- 3 Methodology/Experimental Setup -- 4 Experiment Results -- 5 Conclusion -- References -- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model -- 1 Introduction -- 2 A Brief Review of the LivDet Competition Series -- 3 The LivDet-2009 Competition Dataset -- 4 The LivDet-2011 Competition Dataset -- 5 The LivDet-2013 Competition Dataset -- 6 The LivDet-2015 Competition Dataset -- 7 The LivDet-2017 Competition Dataset -- 8 Traditional Machine Learning Algorithms -- 9 Performance on Other Datasets 
505 8 |a 9.1 Performance on ATVS Data by Scanner Type (Capacitive, Optical, and Thermal) -- 9.2 Performance on Miscellaneous Datasets Using ACE, FAR, and FRR -- 10 Conclusion -- References -- Suitability of Voice Recognition Within the IoT Environment -- 1 Introduction -- 2 Background -- 2.1 Filter Bank Analysis -- 2.2 Linear Predictive Coding [LPC] -- 3 Related Work -- 4 Motivation -- 5 Our Proposed Model -- 6 Implementation -- 6.1 Description of the Implementation -- 6.2 Open Source Software -- 6.3 Dataset -- 6.4 Preprocessing -- 6.5 Feature Extraction -- 6.6 Voice Model Training/Server Side 
500 |a 6.7 Verification. 
520 |a The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students. Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20); Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems. 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed July 23, 2021). 
650 0 |a Computer security  |v Congresses. 
650 0 |a Wireless communication systems  |x Security measures  |v Congresses. 
650 0 |a Internet of things  |v Congresses. 
650 7 |a Computer security  |2 fast 
650 7 |a Internet of things  |2 fast 
650 7 |a Wireless communication systems  |x Security measures  |2 fast 
655 7 |a proceedings (reports)  |2 aat 
655 7 |a Conference papers and proceedings  |2 fast 
655 7 |a Conference papers and proceedings.  |2 lcgft 
655 7 |a Actes de congrès.  |2 rvmgf 
700 1 |a Daimi, Kevin. 
700 1 |a Arabnia, Hamid. 
700 1 |a Deligiannidis, Leonidas. 
700 1 |a Hwang, Min-Shiang. 
700 1 |a Tinetti, Fernando G. 
711 2 |a ICWN (Conference)  |d (2020 :  |c Las Vegas, Nev. ; Online)  |j jointly held conference. 
711 2 |a ICOMP (Conference)  |d (2020 :  |c Las Vegas, Nev. ; Online)  |j jointly held conference. 
711 2 |a ESCS (Conference)  |d (2020 :  |c Las Vegas, Nev. ; Online)  |j jointly held conference. 
758 |i has work:  |a Advances in security, networks, and Internet of Things (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFDHVJfDxWBftdbJYcdgjC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Daimi, Kevin.  |t Advances in Security, Networks, and Internet of Things.  |d Cham : Springer International Publishing AG, ©2021  |z 9783030710163 
830 0 |a Transactions on computational science and computational intelligence. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-3-030-71017-0  |y Click for online access 
903 |a springengine2021 
994 |a 92  |b HCD