Narrow your search

Library

AP (7)

EhB (7)

KDG (7)

VUB (7)

KU Leuven (5)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

ULB (4)

More...

Resource type

book (14)

digital (7)


Language

English (19)


Year
From To Submit

2012 (3)

2011 (3)

2010 (7)

2009 (6)

Listing 1 - 10 of 19 << page
of 2
>>
Sort by

Book
Chaos-based cryptography : theory, algorithms and applications
Authors: ---
ISBN: 3642205410 3642205429 Year: 2011 Publisher: Berlin ; Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection.   The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics.   The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.  .

Keywords

Engineering & Applied Sciences --- Computer Science --- Cryptography --- Chaotic behavior in systems. --- Data processing. --- Chaos in systems --- Chaos theory --- Chaotic motion in systems --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Engineering. --- Data structures (Computer science). --- Data encryption (Computer science). --- Artificial intelligence. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Intelligence, Computational --- Artificial intelligence --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Construction --- Industrial arts --- Technology --- Soft computing --- Differentiable dynamical systems --- Dynamics --- Nonlinear theories --- System theory --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Artificial Intelligence. --- Cryptology. --- Data Structures and Information Theory.


Digital
Chaos-Based Cryptography : Theory,Algorithms and Applications
Authors: ---
ISBN: 9783642205422 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Security and Privacy in Mobile Information and Communication Systems : First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers
Authors: ---
ISBN: 9783642044342 Year: 2009 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Book
Security and privacy in mobile information and communication systems : first international ICST conference, MOBISEC 2009, Turin, Italy, June 3-5, 2009, revised selected papers
Authors: --- ---
ISBN: 3642044336 9786612361883 1282361880 3642044344 Year: 2009 Publisher: Berlin ; Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications.

Keywords

Wireless communication systems --Security measures --Congresses. --- Wireless communication systems --- Library & Information Science --- Telecommunications --- Computer Science --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Social Sciences --- Security measures --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Computer science. --- Computer system failures. --- Computer programming. --- Data structures (Computer science). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computer Science. --- Data Encryption. --- Information Storage and Retrieval. --- Programming Techniques. --- Data Structures, Cryptology and Information Theory. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Information storage and retrieva. --- Data structures (Computer scienc. --- Computer system performance. --- Cryptology. --- Data Structures and Information Theory. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Information storage and retrieval systems. --- Application software. --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Failures --- Programming --- Telecommunication systems


Book
Intelligent multimedia communication : techniques and applications
Authors: --- ---
ISBN: 364211685X 9786613476357 3642116868 1283476355 Year: 2010 Publisher: Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers’ properties to improve the network’s resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network’s bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere. The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.

Keywords

Multimedia communications --- Artificial intelligence --- Civil & Environmental Engineering --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Civil Engineering --- Telecommunications --- Applied Mathematics --- Data processing --- Multimedia systems. --- Computational intelligence. --- Intelligence, Computational --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Engineering. --- Computers. --- Artificial intelligence. --- Applied mathematics. --- Engineering mathematics. --- Electrical engineering. --- Appl.Mathematics/Computational Methods of Engineering. --- Artificial Intelligence (incl. Robotics). --- Communications Engineering, Networks. --- Information Systems and Communication Service. --- Electric engineering --- Engineering --- Engineering analysis --- Mathematical analysis --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Construction --- Industrial arts --- Technology --- Mathematics --- Soft computing --- Information storage and retrieval systems --- Telecommunication. --- Information systems. --- Mathematical and Computational Engineering. --- Artificial Intelligence. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting


Book
Chaos-Based Cryptography
Authors: --- ---
ISBN: 9783642205422 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection.   The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics.   The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.  


Multi
Intelligent Multimedia Communication: Techniques and Applications
Authors: --- ---
ISBN: 9783642116865 9783642269431 9783642117817 9783642116858 Year: 2010 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers’ properties to improve the network’s resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network’s bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere. The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.


Book
TV content analysis : techniques and applications
Authors: --- ---
ISBN: 9781439855607 1439855609 9781439855621 1439855625 Year: 2012 Publisher: Boca Raton, FL CRC Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

"TV content is currently available through various communication channels and devices, including digital TV, mobile TV, and Internet TV. However, with the increase in TV content volume, both its management and consumption become more and more challenging. Thoroughly describing TV program analysis techniques, this book explores the systems, architectures, algorithms, applications, research results, new approaches, and open issues. Leading experts address a wide variety of related subject areas and present a scientifically sound treatment of state-of-the-art techniques for readers interested or involved in TV program analysis"--Provided by publisher. "The book aims to give a thorough description of TV program analysis techniques, which consist of algorithms, systems, architectures, applications, overviews, including the latest research results, new emerging approaches and open issues"--Provided by publisher.


Book
Intelligent computing based on chaos
Authors: --- --- ---
ISBN: 3540959718 3540959726 Year: 2009 Publisher: Berlin ; Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Chaos is a fascinating phenomenon that has been observed in nature, laboratory, and has been applied in various real-world applications. Chaotic systems are deterministic with no random elements involved yet their behavior appears to be random. Observations of chaotic behavior in nature include weather and climate, the dynamics of satellites in the solar system, the time evolution of the magnetic field of celestial bodies, population growth in ecology, to mention only a few examples. Chaos has been observed in the laboratory in a number of systems such as electrical circuits, lasers, chemical reactions, fluid dynamics, mechanical systems, and magneto-mechanical devices. Chaotic behavior has also found numerous applications in electrical and communication engineering, information and communication technologies, biology and medicine. The book project was launched to access the latest research related to chaos applications in intelligent computing where researchers from all over the world provide the necessary coverage of the mentioned field. The primary objective of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technologies and providing the most comprehensive list of research references. The coverage of this book provides strength to this reference resource for both researchers and also decision makers in obtaining a greater understanding of the concepts, issues, problems, trends, challenges and opportunities related to this field of study.

Keywords

Computational intelligence --- Chaotic behavior in systems --- Civil Engineering --- Computer Science --- Applied Mathematics --- Engineering & Applied Sciences --- Civil & Environmental Engineering --- Computational intelligence. --- Chaotic behavior in systems. --- Chaos in systems --- Chaos theory --- Chaotic motion in systems --- Intelligence, Computational --- Engineering. --- Artificial intelligence. --- Statistical physics. --- Dynamical systems. --- Applied mathematics. --- Engineering mathematics. --- Appl.Mathematics/Computational Methods of Engineering. --- Statistical Physics, Dynamical Systems and Complexity. --- Artificial Intelligence (incl. Robotics). --- Engineering --- Engineering analysis --- Mathematical analysis --- Dynamical systems --- Kinetics --- Mathematics --- Mechanics, Analytic --- Force and energy --- Mechanics --- Physics --- Statics --- Mathematical statistics --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Statistical methods --- Differentiable dynamical systems --- Dynamics --- Nonlinear theories --- System theory --- Artificial intelligence --- Soft computing --- Mathematical and Computational Engineering. --- Complex Systems. --- Artificial Intelligence. --- Statistical Physics and Dynamical Systems.


Book
Intelligent Multimedia Communication: Techniques and Applications
Authors: --- --- ---
ISBN: 9783642116865 9783642269431 9783642117817 9783642116858 Year: 2010 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers' properties to improve the network's resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network's bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere. The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.

Listing 1 - 10 of 19 << page
of 2
>>
Sort by