GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Document type
Language
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computer security. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (305 pages)
    Edition: 1st ed.
    ISBN: 9789811587115
    Series Statement: Algorithms for Intelligent Systems Series
    DDC: 005.8
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Part ISecurity Using Cryptography and Chaotic Theory: Algorithm Development and Analysis -- 1 Securing Medical Images via a Texture and Chaotic Key Framework -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Initial Pixel Shuffling via ACM -- 3.2 Low-/Mid-Frequency Maps via Gabor Filters -- 3.3 Key Generation via Chaotic Maps -- 4 Results and Analysis -- 4.1 Histogram Analysis -- 4.2 Image Entropy -- 4.3 Line Profile -- 4.4 Correlation Coefficient -- 4.5 Key Space of the Proposed Cryptosystem -- 4.6 Image Quality Performance -- 5 Conclusion -- References -- 2 Image Encryption Based on DNA Substitution and Chaotic Theory -- 1 Introduction -- 2 Introduction to DNA -- 2.1 DNA Encoding and Complementary Rule -- 2.2 DNA-Based Image Encryption -- 3 Chaos and Logistic Map -- 4 Literature Review -- 5 Proposed Method -- 5.1 Formation of Chaotic Binary Sequence -- 5.2 DNA Substitution -- 6 Algorithm Description of the Proposed Technique -- 7 Simulation Results -- 7.1 Security Analysis -- 7.2 Secret Key's Sensitivity Analysis -- 7.3 Secret Key's Space Analysis -- 7.4 Histogram Analysis -- 8 Conclusion -- References -- 3 Impact of Computational Power on Cryptography -- 1 Introduction -- 1.1 Literature Review -- 1.2 Organization of Chapter -- 2 Introduction to Cryptography -- 3 Pre-multimedia Era cryptography-The Classical Cryptography -- 3.1 Caesar Cipher -- 3.2 Shift Ciphers -- 3.3 Impact of Computational Power on Caesar and Shift Ciphers -- 3.4 Monoalphabetic Substitution Ciphers (MASC) -- 3.5 Vigenère Cipher -- 3.6 Impact of Computational Power on Vigenère Cipher -- 3.7 The One-Time Pad or Vernam Cipher -- 3.8 Impact of Computational Power on One-Time Pad -- 3.9 Transposition or Permutation Ciphers -- 3.10 Impact of Computational Power on Transposition Ciphers. , 4 Modern Cryptography -- 4.1 Data Encryption Standard (DES) -- 4.2 Impact of Computational Power on DES -- 4.3 Tripe DES (3DES or FIPS 46-3) -- 4.4 Impact of Computational Power on 3DES -- 4.5 AES-Advanced Encryption Standard -- 4.6 Impact of Computational Power on AES -- 4.7 RSA Public Key Cipher -- 4.8 Impact of Computational Power on RSA -- 4.9 Elliptic Curve Cryptography (ECC) -- 4.10 Impact of Computational Power on Elliptic Curve Cryptography (ECC) -- 5 Conclusion -- References -- 4 Privacy Preserving Anti-forensic Techniques -- 1 Introduction -- 2 Related Work -- 2.1 Privacy -- 2.2 Anti-forensics -- 3 Privacy Preserving Anti-forensic Techniques -- 3.1 Data Wiping: Secured Deletion -- 3.2 Boot Sector -- 3.3 Reserved Locations -- 3.4 Slack Space -- 3.5 HPA and DCO -- 3.6 Directory Mounting: Hiding in Plain Sight -- 3.7 Encryption: Second Most Anti-forensic Technique -- 3.8 Steganography: A Perfect Camouflage -- 3.9 Onion Routing: Anonymous Communication -- 4 Discussion -- 5 Conclusion -- References -- Part IIInformation Embedding for Secure Data Communication and Authentication -- 5 Information Embedding Using DNA Sequences for Covert Communication -- 1 Introduction -- 2 Introduction to DNA -- 2.1 DNA Computing -- 2.2 DNA Cryptography -- 3 Literature Review -- 4 Proposed Method -- 4.1 Method 1: New Substitution Method for Data Hiding Using DNA Sequences -- 4.2 Method 2: New Insertion Method for Data Encryption Using DNA Sequences -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- 6 Information Hiding in Color Images Utilizing Multi-bit Substitution Patterns -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 3.1 Interpolation -- 3.2 Multi-bit Substitution Pattern -- 3.3 Data Embedding -- 3.4 Data Extraction -- 4 Results and Discussions -- 4.1 Imperceptibility Analysis -- 4.2 Reversibility analysis. , 4.3 Authentication and Fragility analysis -- 5 Summary -- References -- 7 Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Scheme -- 4 Experimental Results -- 5 Conclusion -- References -- 8 Survey on Reversible Watermarking Techniques for Medical Images -- 1 Introduction -- 2 General Framework for Digital Watermarking -- 2.1 Watermark Embedding Module (WEM) -- 2.2 Watermark Detection/Extraction Module (WDM) -- 3 Classification of Digital Watermarking -- 3.1 Fragile Watermarking -- 3.2 Semi-fragile Watermarking -- 3.3 Robust Watermarking -- 4 Classification of Reversible Digital Watermarking -- 5 Evaluation Metrics -- 5.1 Peak Signal-To-Noise Ratio (PSNR) -- 5.2 Structural Similarity (SSIM) Index -- 6 State-of-the-Art Reversible Watermarking for Medical Imagery -- 7 Conclusion -- References -- 9 Security and Privacy of E-health Data -- 1 Introduction -- 2 Background -- 2.1 Applications of Electronic Health Records (EHR) -- 2.2 Privacy in Electronic Health Systems -- 3 Security in Electronic Health Systems -- 4 Security Models Proposed in E-healthcare -- 5 Conclusion -- References -- Part IIISecurity in IoT and Big Data-Driven Enterprise -- 10 Implementation of Intrusion Detection System for Internet of Things Using Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Result and Analysis -- 5 Conclusion and Future Scope -- References -- 11 An Efficient Approach for Phishing Detection using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology Used -- 3.1 Data Acquisition -- 3.2 Classification before Feature Selection -- 3.3 Feature Selection -- 3.4 Classification after Feature Selection -- 3.5 Evaluation and Validation -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References. , 12 Use of Blockchain and Internet of Things for Securing Data in Healthcare Systems -- 1 Introduction -- 1.1 Blockchain Concept -- 1.2 Internet of Things -- 2 History of Blockchain -- 3 Working of Blockchain -- 4 Literature Survey -- 5 Proposed Methodology -- 6 Scope of Improvement in Model -- 7 Conclusion -- References -- 13 Asset Security in Data of Internet of Things Using Blockchain Technology -- 1 Introduction -- 1.1 Blockchain Concept -- 1.2 Internet of Things -- 1.3 Blockchain in Internet of Things -- 1.4 Key Blockchain Features for Building Trust in Organizations -- 2 Related Work -- 3 Asset Management in IoT Using Blockchain -- 4 Future Trends of Blockchain in IoT -- 5 Conclusion -- References -- 14 Review of Secure Distributed Range-Free Hop-Based Localization Algorithms in the Wireless Sensor Networks -- 1 Introduction -- 2 Localization Process -- 3 Localization Types -- 3.1 GPS Related -- 3.2 Communication-Based -- 3.3 Anchor Related -- 3.4 Range Related -- 3.5 Range-Free Schemes -- 4 Issues in Localization -- 4.1 Accuracy -- 4.2 Energy Consumption -- 4.3 Overhead -- 4.4 Optimization -- 4.5 Mobility -- 4.6 3D Deployment -- 4.7 Security -- 5 Need of Secure Localization -- 5.1 Security Requirements -- 5.2 Various Attacks in Localization -- 6 Secure Localization-Based Related Work -- 7 Multimedia Security and Authentication Techniques-Related Work -- 8 Research Gaps -- 9 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Forschungsbericht ; Kernreaktorsicherheit ; Aderisolation ; PEP ; Isolierhülle ; Polyethylene ; Alterung ; Zerstörungsfreie Werkstoffprüfung
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource (127 Seiten, 7,10 MB) , Illustrationen, Diagramme
    Language: German , English
    Note: Förderkennzeichen BMWi 1501567A+B , Verbundnummer 01183601 , Unterschiede zwischen dem gedruckten Dokument und der elektronischen Ressource können nicht ausgeschlossen werden , Sprache der Kurzfassungen: Deutsch, Englisch
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Neuherberg : Helmholtz Zentrum München, Abteilung Medizinische Strahlenphysik und Diagnostik, Institut für Strahlenschutz
    Keywords: Forschungsbericht ; Radionuklid ; Grenzwert ; Bodenverschmutzung
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource (330 Seiten, 9,1 MB) , Illustrationen, Diagramme
    Language: German , English
    Note: Förderkennzeichen BMBF 02NUK015B. - Verbund-Nummer 01080402 , Autoren dem Berichtsblatt entnommen , Unterschiede zwischen dem gedruckten Dokument und der elektronischen Ressource können nicht ausgeschlossen werden , Mit deutscher und englischer Zusammenfassung
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Electronic Resource
    Electronic Resource
    Springer
    Cellular and molecular life sciences 46 (1990), S. 797-806 
    ISSN: 1420-9071
    Keywords: Aquifers ; groundwater ; deep subsurface microorganisms ; eukaryotes ; prokaryotes ; microbial metabolism ; oligotrophic conditions ; xenobiotic compounds
    Source: Springer Online Journal Archives 1860-2000
    Topics: Biology , Medicine
    Notes: Summary Little is known about the layers under the earth's crust. Only in recent years have techniques for sampling the deeper subsurface been developed to permit investigation of the subsurface environment. Prevailing conditions in the subsurface habitat such as nutrient availability, soil composition, redox potential, permeability and a variety of other factors can influence the microflora that flourish in a given environment. Microbial diversity varies between geological formations, but in general sandy soils support growth better than soils rich in clay. Bacteria predominate in subsurface sediments, while eukaryotes constitute only 1–2% of the microorganisms. Recent investigations revealed that most uncontaminated subsurface soils support the growth of aerobic heteroorganotrophic bacteria, but obviously anaerobic microorganisms also exist in the deeper subsurface habitat. The microorganisms residing below the surface of the earth are capable of degrading both natural and xenobiotic contaminants and can thereby adapt to growth under polluted conditions.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Electronic Resource
    Electronic Resource
    Springer
    Cellular and molecular life sciences 38 (1982), S. 167-176 
    ISSN: 1420-9071
    Source: Springer Online Journal Archives 1860-2000
    Topics: Biology , Medicine
    Notes: Summary Large efforts are directed towards production of ethanol from cellulosic biomass in order to reduce our dependence on petroleum based ethylene. No satisfactory process exists to date, however, which would make the aromatic molecules present in wood available to economic exploitation. A combination of physicochemical pretreatment of lignocellulose and selective microbial conversion of the mixture of aromatic monomers into a few phenolic products is outlined. Anaerobic microbial communities are employed since they offer thermodynamic and physiological characteristics necessary for efficient conversion. Under anaerobic conditions most of the carbon and energy initially present in the substrate can be recovered as useful products; oxidative losses as CO2 and H2O are minimized. The 3,4-disubstituted aromatic lignin monomers are converted to catechol while 3,4,5-trisubstituted monomers are mineralized to CH4 and CO2. Further studies are directed towards an understanding of the physiological functions of the populations participating in the conversion process, the reason for catechol recalcitrance and the tolerance of the community towards phenolic endproducts.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Electronic Resource
    Electronic Resource
    Springer
    Applied physics 56 (1993), S. 299-302 
    ISSN: 1432-0630
    Keywords: 72.20 ; 73.40 ; 82.70
    Source: Springer Online Journal Archives 1860-2000
    Topics: Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Physics
    Notes: Abstract Samples of carbon black loaded nitrile rubber are measured at microwave frequencies (waveguide transmission and reflection). The observed dielectric relaxation is interpreted using a two phase effective medium model (Böttcher formula). The two phases are identified with free rubber as insulating matrix and a conductive filler of a priori unknown parameters (volume fraction, permittivity, conductivity). Supported by SEM and de measurements the results allow to associate the filler phase with adsorbate covered carbon black. In this way the bulk conductivity of carbon black loaded rubber can be explained by (statistical) percolation, which has been not possible taking pure carbon black particles as the percolating elements. Because the effective conductivity of the filler particles deduced from the microwave measurements characterizes mainly the particles' surface it is supposed that the adsorbate may become conductive by the chemical and physical interactions of polymer and carbon black during the preparation of the composite. Reference is made to the doping of rubber resulting in conductivities of the same order of magnitude.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Electronic Resource
    Electronic Resource
    Amsterdam : Elsevier
    Journal of Chromatography B: Biomedical Sciences and Applications 145 (1978), S. 105-114 
    ISSN: 0378-4347
    Source: Elsevier Journal Backfiles on ScienceDirect 1907 - 2002
    Topics: Chemistry and Pharmacology
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Electronic Resource
    Electronic Resource
    s.l. : American Chemical Society
    Industrial and engineering chemistry 1 (1962), S. 127-132 
    Source: ACS Legacy Archives
    Topics: Chemistry and Pharmacology , Process Engineering, Biotechnology, Nutrition Technology
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Electronic Resource
    Electronic Resource
    s.l. : American Chemical Society
    Industrial and engineering chemistry 1 (1962), S. 296-302 
    Source: ACS Legacy Archives
    Topics: Chemistry and Pharmacology , Process Engineering, Biotechnology, Nutrition Technology
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Electronic Resource
    Electronic Resource
    Woodbury, NY : American Institute of Physics (AIP)
    Applied Physics Letters 74 (1999), S. 2779-2781 
    ISSN: 1077-3118
    Source: AIP Digital Archive
    Topics: Physics
    Notes: Generation of pure, metal-vapor plasmas with peak densities above 1019 cm−3 is reported. The plasma production is based on the explosive ablation of electrode material in the capillary μs discharge. The plasma density is controlled by varying the discharge parameters. High purity and density were achieved by optimizing the electrode configuration, the capillary material, and dimensions. © 1999 American Institute of Physics.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...