Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Preface Organization Contents Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves
1 Introduction 2 Background
2.1 Commitment Schemes 2.2 Twisted Edwards Curves
3 Implementation Details
3.1 Prime-Field Arithmetic 3.2 Point Arithmetic 3.3 Computation of Pedersen Commitments 3.4 Supported TE Curves
4 Benchmarking Results
4.1 Field Operations 4.2 Commitments
5 Applications 6 Concluding Remarks A Algorithms for Point Arithmetic References
Enhanced Sinkhole System: Collecting System Details to Support Investigations
1 Introduction 2 Related Work 3 DNS Sinkholing
3.1 Concept 3.2 Implementation 3.3 Malicious Domains 3.4 Sinkhole System
4 Enhanced Sinkhole System
4.1 Approach 4.2 Characteristics
5 Evaluation
5.1 Lab Environment 5.2 Proof of Concept System 5.3 Malware Execution
6 Conclusion and Future Work References
An Autonomous System Based Security Mechanism for Network Coding Applications in Content-Centric Networking
1 Introduction 2 CCN Fundamentals
2.1 Content Retrieval in CCN 2.2 Security Practice in Original CCN 2.3 Security Related Work
3 Network Coding in CCN
3.1 General NC Mechanism Without Security Measures
4 Security Mechanism Based on Autonomous Systems
4.1 Implications for Producers 4.2 Implications for Routers Within an AS 4.3 Implications for Border Routers 4.4 Implications for Consumers
5 Performance and Implementation Issues 6 Conclusion and Future Work References
An Ultra-Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things
1 Introduction 2 Related Work 3 The Proposed Scheme
3.1 Network Architecture 3.2 Notations 3.3 Functioning
4 Security Analysis of the Proposed Scheme 5 Performance Analysis of the Proposed Scheme 6 Conclusion References
Authentication Based Elliptic Curves Digital Signature for ZigBee Networks
Abstract 1 Introduction 2 ZigBee Standards
2.1 ZigBee Key Management
3 ECDSA Algorithm 4 Related Works 5 Authentication Based Elliptic Curves Digital Signature for ZigBee Networks
5.1 Access Control 5.2 Group Key Calculation 5.3 End to End Authentication 5.4 Adding New Nodes to the Network
6 Security Analysis
6.1 Access Control 6.2 Protection Against Man-in-the-Middle Attack 6.3 Resistance to Eavesdropping
7 Performances Analysis
7.1 Energy Consumption 7.2 Delay of Authentication Between Two Devices 7.3 Resources Consumption
8 Conclusion References
Formal Modeling and Performance Evaluation of Network’s Server Under SYN/TCP Attack
Abstract 1 Introduction 2 Related Works 3 Petri Nets
3.1 Description of Petri Net 3.2 Enabling Rule 3.3 Deterministic and Stochastic Petri Nets (DSPN)
4 Description of SYN/TCP Attack Model
4.1 DSPN Model of SYN/TCP Attack
5 Evaluation of Connection Loss Probability Ploss
5.1 Qualitative Analysis 5.2 Numerical Examples for Evaluation of Loss Connection Probability 5.3 Evaluation of Some Other Performance Parameters
6 Conclusion References
Empirical Evaluation of a Distributed Deployment Strategy for Virtual Networks
1 Introduction 2 The Virtual Network Embedding Problem 3 Related Work
3.1 Centralized Approaches 3.2 Distributed Approaches
4 The DPVNE Algorithm 5 Method 6 Evaluation
6.1 Setup 6.2 Results
7 Conclusion References
Identifying Service Contexts for QoS Support in IoT Service Oriented Software Defined Networks
Abstract 1 Introduction 2 Related Works 3 Acquiring Service Context Through Traffic Classification
3.1 Target Services 3.2 Data Acquisition and Pre-processing 3.3 Identifying Flows Based on Legacy Method 3.4 Identification Based on Statistical Properties Flows 3.5 MPL, MIAT and Standard Deviation Interpacket Arrival Time (SDIAT)
4 Conclusion Acknowledgement References
A Fast Bit-Level MPLS-Based Source Routing Scheme in Software Defined Networks: SD-{W,L}AN
1 Introduction 2 Related Work 3 Proposed Mechanism
3.1 Problem Formulation 3.2 Proposed Scheme 3.3 Routing Path Clustering 3.4 Encoding Routing Information Procedure 3.5 Decoding Routing Information Procedure 3.6 Multicast Scenario
4 Experiment and Results
4.1 Results Analysis
5 Conclusion and Future Work References
Requirements and Complexity Analysis of Cross-Layer Design Optimization for Adaptive Inter-vehicle DSRC
Abstract 1 Introduction 2 Empirical Study of V2V DSRC Performance
2.1 DSRC Channel Conditions in Various Traffic Scenarios 2.2 Performance of DSRC in Different Channel Congestion Conditions
3 Existing Approaches to DSRC Congestion Control
3.1 Channel Congestion Control 3.2 Awareness Control
4 Cross-Layer Design for DSRC
4.1 Requirements of C-ITS Safety Applications 4.2 Cross-Layer Design Approach
5 Evaluation of CLD-DSRC Complexity
5.1 Evaluation Metrics 5.2 Time-Space Complexity 5.3 Stack-Database Crossing and Data Path Delay
6 Discussion and Conclusions References
Technique Stages for Efficient Wideband Spectrum Sensing Based on Compressive Sensing
Abstract 1 Introduction 2 Reference Framework 3 Proposed Methodological Approach
3.1 Pre-processing and Digitizing the RF Signal 3.2 Extraction of Characteristics 3.3 Classification and Identification
4 Methodology Validation 5 Wideband Spectrum Sensing Algorithm 6 Performance Evaluation 7 Conclusions References
Predicting Response Time-Related Quality-of-Service Outages of PaaS Cloud Applications by Machine Learning
1 Introduction 2 Related Work 3 Design of the Prediction Approach 4 Proof-of-Concept Implementation 5 Evaluation and Results 6 Conclusion References
Intelligent Road Design Using Artificial Intelligence Techniques
1 Introduction 2 Hypothesis 3 Methodology 4 Design 5 Discussion of Results 6 Conclusions References
Mobility Prediction in Vehicular Networks: An Approach Through Hybrid Neural Networks Under Uncertainty
1 Introduction 2 Related Work 3 Mathematical Formulation of Proposed Model
3.1 Structure of the Auxiliary Function in a Vehicular Network
4 Proposed High Level Description of the Hybrid Neural Network
4.1 Results and Analysis
5 Conclusion References
Building of an Information Retrieval System Based on Genetic Algorithms
1 Introduction 2 Genetic Algorithm in Information Retrieval System
2.1 Information Retrieval System 2.2 Genetic Algorithm 2.3 Genetic Algorithms in Query Optimization
3 Genetic Algorithm Based Query Optimization Method
3.1 Document Vectorization and Relevance Feedback 3.2 Chromosomes and Population 3.3 Fitness Function 3.4 Genetic Operators 3.5 Next Generation 3.6 Termination Criteria and Solution
4 Experimental Results
4.1 Test Collections 4.2 Experiments Preparation 4.3 Selection of Relevance Feedback 4.4 Selection of Queries
5 Explanation of Our Experiments
5.1 Control Parameters 5.2 Evaluation and Experimental Plan 5.3 Experimental Results and Comparison
6 Conclusion and Perspectives References
A GRC-Centric Approach for Enhancing Management Process of IoT-Based Health Institution
Abstract 1 Introduction 2 Domain Model for Health Institution Application Based on IoT 3 A GRC and IOT Technologies Centric Architecture (tGRC)
3.1 Internet of Things 3.2 Governance, Risk Management and Compliance 3.3 The Proposed Information System Architecture Based on IoT Technologies
4 The tGRC Module
4.1 Formalization of the tGRC Concepts (First Tentative)
5 Some Implementation Aspects 6 Related Works 7 Conclusion References
Energy Consumption Estimation for Energy-Aware, Adaptive Sensing Applications
1 Introduction 2 Related Work 3 Energy Aware Sensing Applications
3.1 Sensor Node Logic 3.2 Energy-Aware Planning
4 Simple Sampling Approach 5 Measuring Power Consumption of Phases 6 Runtime Logic for Energy Estimation 7 Evaluation and Discussion 8 Conclusion References
Author Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion