Limit search to available items
Book Cover
E-book
Author SAM (Conference : Computer Security) (2020 : Las Vegas, Nev. ; Online)

Title Advances in security, networks, and Internet of Things : proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 / Kevin Daimi, Hamid R. Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti, editors
Published Cham, Switzerland : Springer, 2021

Copies

Description 1 online resource (854 pages)
Series Transactions on computational science and computational Intelligence
Transactions on computational science and computational intelligence.
Contents Intro -- Preface -- Security and Management -- SAM 2020 -- Program Committee -- Wireless Networks -- ICWN 2020 -- Program Committee -- Internet Computing & IoT -- ICOMP 2020 -- Program Committee -- Embedded Systems, Cyber-physical Systems, & Applications -- ESCS 2020 -- Program Committee -- Contents -- Part I Authentication, Biometrics, and Cryptographic Technologies -- Statistical Analysis of Prime Number Generators Putting Encryption at Risk -- 1 Introduction -- 2 Related Work and Basics -- 2.1 Deterministic RNG -- 2.2 Non-deterministic RNG -- 2.3 Prime Number Generator
2.4 Evaluation of PRNG -- 3 Statistical Analysis -- 3.1 Largest and Smallest Prime Numbers -- 3.2 Mean Value of Prime Numbers -- 3.3 Standard Deviation of Prime Numbers -- 3.4 Largest and Smallest Prime Distances -- 3.5 Maximum Distance -- 3.6 Mean Value of Prime Distances -- 3.7 Standard Deviation of Prime Distances -- 4 Occurrence of Primes Near the Threshold Values -- 5 Occurrence of Distances Near the Threshold Values -- 6 Patterns Within Primes -- 7 Searching for Last Digits -- 8 Benefits from the Statistics -- 9 Conclusions -- References
Secure Authentication Protocol for Drones in LTE Networks -- 1 Introduction -- 2 Related Works -- 3 LTE Drone Control System -- 3.1 General System Architecture -- 3.2 LTE Authentication Protocol -- 3.3 Security Analysis -- 4 Proposed Protocol -- 4.1 Architecture of Proposed Protocol -- 4.2 Phase of Proposed Protocol -- 4.3 Security Analysis of Proposed Protocol -- 5 Formal Analysis -- 5.1 Protocol Verification Tool : Scyther -- 5.2 Specification -- 5.3 Analysis of the Verification Results -- 6 Conclusion -- References -- Memorable Password Generation with AES in ECB Mode -- 1 Introduction
2 Concerns -- 3 Methodology/Experimental Setup -- 4 Experiment Results -- 5 Conclusion -- References -- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model -- 1 Introduction -- 2 A Brief Review of the LivDet Competition Series -- 3 The LivDet-2009 Competition Dataset -- 4 The LivDet-2011 Competition Dataset -- 5 The LivDet-2013 Competition Dataset -- 6 The LivDet-2015 Competition Dataset -- 7 The LivDet-2017 Competition Dataset -- 8 Traditional Machine Learning Algorithms -- 9 Performance on Other Datasets
9.1 Performance on ATVS Data by Scanner Type (Capacitive, Optical, and Thermal) -- 9.2 Performance on Miscellaneous Datasets Using ACE, FAR, and FRR -- 10 Conclusion -- References -- Suitability of Voice Recognition Within the IoT Environment -- 1 Introduction -- 2 Background -- 2.1 Filter Bank Analysis -- 2.2 Linear Predictive Coding [LPC] -- 3 Related Work -- 4 Motivation -- 5 Our Proposed Model -- 6 Implementation -- 6.1 Description of the Implementation -- 6.2 Open Source Software -- 6.3 Dataset -- 6.4 Preprocessing -- 6.5 Feature Extraction -- 6.6 Voice Model Training/Server Side
Summary The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students. Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20); Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems
Notes 6.7 Verification
Includes index
Online resource; title from PDF title page (SpringerLink, viewed July 23, 2021)
Subject Computer security -- Congresses
Wireless communication systems -- Security measures -- Congresses
Internet of things -- Congresses
Computer security
Internet of things
Wireless communication systems -- Security measures
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Daimi, Kevin.
Arabnia, Hamid.
Deligiannidis, Leonidas.
Hwang, Min-Shiang
Tinetti, Fernando G.
ICWN (Conference) (2020 : Las Vegas, Nev. ; Online) jointly held conference
ICOMP (Conference) (2020 : Las Vegas, Nev. ; Online) jointly held conference
ESCS (Conference) (2020 : Las Vegas, Nev. ; Online) jointly held conference
ISBN 9783030710170
3030710173