Advances in security of information and communication networks : first international conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013 : proceedings /

This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The p...

Full description

Saved in:
Bibliographic Details
Corporate Authors: SecNet (Conference) Cairo, Egypt); SpringerLink (Online service)
Group Author: Awad, Ali Ismail; Hassanien, Aboul Ella.; Baba, Kensuke
Published: Springer,
Publisher Address: Heidelberg :
Publication Dates: [2013]
2013
Literature type: eBook
Language: English
Series: Communications in computer and information science, 381
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-40597-6
Summary: This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.
Carrier Form: 1 online resource (xii, 249 pages) : illustrations.
Bibliography: Includes bibliographical references and index.
ISBN: 9783642405976 (electronic bk.)
3642405975 (electronic bk.)
Index Number: TK5105
CLC: TP393.08-532
Contents: Networking Security.
NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study /
Clustering Based Group Key Management for MANET /
Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN /
Hardware Advancements Effects on MANET Development, Application and Research /
A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing /
A Categorized Trust-Based Message Reporting Scheme for VANETs /
Data and Information Security.
Blind Watermark Approach for Map Authentication Using Support Vector Machine /
High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression /
An HMM-Based Reputation Model /
Towards IT-Legal Framework for Cloud Computing /
A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps /
Authentication and Privacy.
A Cattle Identification Approach Using Live Captured Muzzle Print Images /
Algebraic Replay Attacks on Authentication in RFID Protocols /
A Privacy Preserving Approach to Smart Metering /
Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware /
Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study /
Security Applications.
Elderly Healthcare Data Protection Application for Ambient Assisted Living /
A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics /
Machine Learning Techniques for Anomalies Detection and Classification /
Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing /
Linear Correlation-Based Feature Selection for Network Intrusion Detection Model /