Sprache: Englisch
Verlag: Information Science Reference, 2009
ISBN 10: 1605662623 ISBN 13: 9781605662626
Anbieter: Zubal-Books, Since 1961, Cleveland, OH, USA
Zustand: Very Good. *Price HAS BEEN REDUCED by 10% until Monday, Jan. 26 (weekend SALE item)* 587 pp., Hardcover, handstamps to all edges, else very good. - If you are reading this, this item is actually (physically) in our stock and ready for shipment once ordered. We are not bookjackers. Buyer is responsible for any additional duties, taxes, or fees required by recipient's country.
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
EUR 33,90
Anzahl: 1 verfügbar
In den WarenkorbZustand: Good. Volume 354. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,950grams, ISBN:9783642205415.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 70,37
Anzahl: 4 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2011
ISBN 10: 3642175015 ISBN 13: 9783642175015
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 76,61
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 188 pages. 9.21x6.06x0.39 inches. In Stock.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2009
ISBN 10: 3642044336 ISBN 13: 9783642044335
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 78,42
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 289 pages. 9.20x6.10x0.70 inches. In Stock.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2010
ISBN 10: 3642175015 ISBN 13: 9783642175015
Anbieter: moluna, Greven, Deutschland
Zustand: New. Up to date resultsFast conference proceedingsState-of-the-art reportMobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology researc.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Sep 2009, 2009
ISBN 10: 3642044336 ISBN 13: 9783642044335
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applicationsSpringer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 300 pp. Englisch.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2009
ISBN 10: 3642044336 ISBN 13: 9783642044335
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 119,77
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 220 pages. 10.00x7.00x10.24 inches. In Stock.
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
EUR 130,50
Anzahl: 1 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 505 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Sprache: Englisch
Verlag: Springer, Berlin, Springer, 2010
ISBN 10: 3642175015 ISBN 13: 9783642175015
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
EUR 116,39
Anzahl: 1 verfügbar
In den WarenkorbZustand: NEW.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 151,31
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 320 pages. 8.27x5.83x0.73 inches. In Stock.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 152,56
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 287 pages. 8.75x6.25x0.75 inches. In Stock.
Zustand: Hervorragend. Zustand: Hervorragend | Seiten: 310 | Sprache: Englisch | Produktart: Bücher | This book comprehensively analyzes and summarizes the types, characteristics and prevention of deep-sea geological disasters in the South China Sea based on the research progress of global background. It also brings attention to the general public and stakeholders the risks of deep-sea geological disasters.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2016
ISBN 10: 366250653X ISBN 13: 9783662506530
Anbieter: moluna, Greven, Deutschland
Zustand: New. Thorough description and recent research of chaos-based cryptography Covers the basic theories, algorithms and applications of chaos-based cryptography Written by leading experts in the fieldChaos-based cryptography, attracting m.
Taschenbuch. Zustand: Neu. Deepwater Geohazards in the South China Sea | Shiguo Wu (u. a.) | Taschenbuch | xi | Englisch | 2025 | Springer | EAN 9789819996940 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Zustand: Gut. Zustand: Gut | Seiten: 416 | Sprache: Englisch | Produktart: Bücher | The advances in the generation and processing of multimedia data (e. g. documents, images, video, audio, animations, etc. ) have had an immense impact on multimedia applications and, as a result, multimedia has permeated almost every aspect of our daily lives. This development has also brought with it a whole host of issues and ch- lenges which were either not as apparent before or were non-existent. Today, digital media is relied upon as primary news and information resource, as evidence in a court of law, as part of medical records or as financial documents. However, there is still lack of authoritative mechanisms to verify the origin and veracity of media data. - deed, multimedia content has become an extremely valuable asset, and it is being both disseminated and consumed on a larger scale than ever before, but the issues conce- ing how the content owners and publishers should control the distribution of and - cess to their content have not been satisfactorily resolved yet. There are various other issues related to use of multimedia that require further analysis and research. For example, it is a known fact that some criminal organi- tions communicate with its members by posting information embedded media to p- lic forums and web-sites to evade surveillance by law enforcement. Conventional multimedia processing approaches do not provide sufficiently effective means for - fending against such communication.
Sprache: Englisch
Verlag: Springer Nature Singapore Mai 2024, 2024
ISBN 10: 9819996910 ISBN 13: 9789819996919
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -This book comprehensively analyzes and summarizes the types, characteristics and prevention of deep-sea geological disasters in the South China Sea based on the research progress of global background. It also brings attention to the general public and stakeholders the risks of deep-sea geological disasters.Springer-Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 312 pp. Englisch.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Jun 2011, 2011
ISBN 10: 3642205410 ISBN 13: 9783642205415
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection.The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics.The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 408 pp. Englisch.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Apr 2010, 2010
ISBN 10: 3642117546 ISBN 13: 9783642117541
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -The advances in the generation and processing of multimedia data (e. g. documents, images, video, audio, animations, etc. ) have had an immense impact on multimedia applications and, as a result, multimedia has permeated almost every aspect of our daily lives. This development has also brought with it a whole host of issues and ch- lenges which were either not as apparent before or were non-existent. Today, digital media is relied upon as primary news and information resource, as evidence in a court of law, as part of medical records or as financial documents. However, there is still lack of authoritative mechanisms to verify the origin and veracity of media data. - deed, multimedia content has become an extremely valuable asset, and it is being both disseminated and consumed on a larger scale than ever before, but the issues conce- ing how the content owners and publishers should control the distribution of and - cess to their content have not been satisfactorily resolved yet. There are various other issues related to use of multimedia that require further analysis and research. For example, it is a known fact that some criminal organi- tions communicate with its members by posting information embedded media to p- lic forums and web-sites to evade surveillance by law enforcement. Conventional multimedia processing approaches do not provide sufficiently effective means for - fending against such communication.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 416 pp. Englisch.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Nov 2013, 2013
ISBN 10: 3642269435 ISBN 13: 9783642269431
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers¿ properties to improve the network¿s resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network¿s bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere.The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 520 pp. Englisch.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2012
ISBN 10: 3642263224 ISBN 13: 9783642263224
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The advances in the generation and processing of multimedia data (e. g. documents, images, video, audio, animations, etc. ) have had an immense impact on multimedia applications and, as a result, multimedia has permeated almost every aspect of our daily lives. This development has also brought with it a whole host of issues and ch- lenges which were either not as apparent before or were non-existent. Today, digital media is relied upon as primary news and information resource, as evidence in a court of law, as part of medical records or as financial documents. However, there is still lack of authoritative mechanisms to verify the origin and veracity of media data. - deed, multimedia content has become an extremely valuable asset, and it is being both disseminated and consumed on a larger scale than ever before, but the issues conce- ing how the content owners and publishers should control the distribution of and - cess to their content have not been satisfactorily resolved yet. There are various other issues related to use of multimedia that require further analysis and research. For example, it is a known fact that some criminal organi- tions communicate with its members by posting information embedded media to p- lic forums and web-sites to evade surveillance by law enforcement. Conventional multimedia processing approaches do not provide sufficiently effective means for - fending against such communication.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2016
ISBN 10: 366250653X ISBN 13: 9783662506530
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2011
ISBN 10: 3642205410 ISBN 13: 9783642205415
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2013
ISBN 10: 3642269435 ISBN 13: 9783642269431
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers' properties to improve the network's resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network's bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere. The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2010
ISBN 10: 3642117546 ISBN 13: 9783642117541
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The advances in the generation and processing of multimedia data (e. g. documents, images, video, audio, animations, etc. ) have had an immense impact on multimedia applications and, as a result, multimedia has permeated almost every aspect of our daily lives. This development has also brought with it a whole host of issues and ch- lenges which were either not as apparent before or were non-existent. Today, digital media is relied upon as primary news and information resource, as evidence in a court of law, as part of medical records or as financial documents. However, there is still lack of authoritative mechanisms to verify the origin and veracity of media data. - deed, multimedia content has become an extremely valuable asset, and it is being both disseminated and consumed on a larger scale than ever before, but the issues conce- ing how the content owners and publishers should control the distribution of and - cess to their content have not been satisfactorily resolved yet. There are various other issues related to use of multimedia that require further analysis and research. For example, it is a known fact that some criminal organi- tions communicate with its members by posting information embedded media to p- lic forums and web-sites to evade surveillance by law enforcement. Conventional multimedia processing approaches do not provide sufficiently effective means for - fending against such communication.