GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Computer security. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (305 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811587115
    Serie: Algorithms for Intelligent Systems Series
    DDC: 005.8
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- About the Editors -- Part ISecurity Using Cryptography and Chaotic Theory: Algorithm Development and Analysis -- 1 Securing Medical Images via a Texture and Chaotic Key Framework -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Initial Pixel Shuffling via ACM -- 3.2 Low-/Mid-Frequency Maps via Gabor Filters -- 3.3 Key Generation via Chaotic Maps -- 4 Results and Analysis -- 4.1 Histogram Analysis -- 4.2 Image Entropy -- 4.3 Line Profile -- 4.4 Correlation Coefficient -- 4.5 Key Space of the Proposed Cryptosystem -- 4.6 Image Quality Performance -- 5 Conclusion -- References -- 2 Image Encryption Based on DNA Substitution and Chaotic Theory -- 1 Introduction -- 2 Introduction to DNA -- 2.1 DNA Encoding and Complementary Rule -- 2.2 DNA-Based Image Encryption -- 3 Chaos and Logistic Map -- 4 Literature Review -- 5 Proposed Method -- 5.1 Formation of Chaotic Binary Sequence -- 5.2 DNA Substitution -- 6 Algorithm Description of the Proposed Technique -- 7 Simulation Results -- 7.1 Security Analysis -- 7.2 Secret Key's Sensitivity Analysis -- 7.3 Secret Key's Space Analysis -- 7.4 Histogram Analysis -- 8 Conclusion -- References -- 3 Impact of Computational Power on Cryptography -- 1 Introduction -- 1.1 Literature Review -- 1.2 Organization of Chapter -- 2 Introduction to Cryptography -- 3 Pre-multimedia Era cryptography-The Classical Cryptography -- 3.1 Caesar Cipher -- 3.2 Shift Ciphers -- 3.3 Impact of Computational Power on Caesar and Shift Ciphers -- 3.4 Monoalphabetic Substitution Ciphers (MASC) -- 3.5 Vigenère Cipher -- 3.6 Impact of Computational Power on Vigenère Cipher -- 3.7 The One-Time Pad or Vernam Cipher -- 3.8 Impact of Computational Power on One-Time Pad -- 3.9 Transposition or Permutation Ciphers -- 3.10 Impact of Computational Power on Transposition Ciphers. , 4 Modern Cryptography -- 4.1 Data Encryption Standard (DES) -- 4.2 Impact of Computational Power on DES -- 4.3 Tripe DES (3DES or FIPS 46-3) -- 4.4 Impact of Computational Power on 3DES -- 4.5 AES-Advanced Encryption Standard -- 4.6 Impact of Computational Power on AES -- 4.7 RSA Public Key Cipher -- 4.8 Impact of Computational Power on RSA -- 4.9 Elliptic Curve Cryptography (ECC) -- 4.10 Impact of Computational Power on Elliptic Curve Cryptography (ECC) -- 5 Conclusion -- References -- 4 Privacy Preserving Anti-forensic Techniques -- 1 Introduction -- 2 Related Work -- 2.1 Privacy -- 2.2 Anti-forensics -- 3 Privacy Preserving Anti-forensic Techniques -- 3.1 Data Wiping: Secured Deletion -- 3.2 Boot Sector -- 3.3 Reserved Locations -- 3.4 Slack Space -- 3.5 HPA and DCO -- 3.6 Directory Mounting: Hiding in Plain Sight -- 3.7 Encryption: Second Most Anti-forensic Technique -- 3.8 Steganography: A Perfect Camouflage -- 3.9 Onion Routing: Anonymous Communication -- 4 Discussion -- 5 Conclusion -- References -- Part IIInformation Embedding for Secure Data Communication and Authentication -- 5 Information Embedding Using DNA Sequences for Covert Communication -- 1 Introduction -- 2 Introduction to DNA -- 2.1 DNA Computing -- 2.2 DNA Cryptography -- 3 Literature Review -- 4 Proposed Method -- 4.1 Method 1: New Substitution Method for Data Hiding Using DNA Sequences -- 4.2 Method 2: New Insertion Method for Data Encryption Using DNA Sequences -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- 6 Information Hiding in Color Images Utilizing Multi-bit Substitution Patterns -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 3.1 Interpolation -- 3.2 Multi-bit Substitution Pattern -- 3.3 Data Embedding -- 3.4 Data Extraction -- 4 Results and Discussions -- 4.1 Imperceptibility Analysis -- 4.2 Reversibility analysis. , 4.3 Authentication and Fragility analysis -- 5 Summary -- References -- 7 Data Embedding in Color Images: A Secure Data Communication Framework Based on Modular Arithmetic -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Scheme -- 4 Experimental Results -- 5 Conclusion -- References -- 8 Survey on Reversible Watermarking Techniques for Medical Images -- 1 Introduction -- 2 General Framework for Digital Watermarking -- 2.1 Watermark Embedding Module (WEM) -- 2.2 Watermark Detection/Extraction Module (WDM) -- 3 Classification of Digital Watermarking -- 3.1 Fragile Watermarking -- 3.2 Semi-fragile Watermarking -- 3.3 Robust Watermarking -- 4 Classification of Reversible Digital Watermarking -- 5 Evaluation Metrics -- 5.1 Peak Signal-To-Noise Ratio (PSNR) -- 5.2 Structural Similarity (SSIM) Index -- 6 State-of-the-Art Reversible Watermarking for Medical Imagery -- 7 Conclusion -- References -- 9 Security and Privacy of E-health Data -- 1 Introduction -- 2 Background -- 2.1 Applications of Electronic Health Records (EHR) -- 2.2 Privacy in Electronic Health Systems -- 3 Security in Electronic Health Systems -- 4 Security Models Proposed in E-healthcare -- 5 Conclusion -- References -- Part IIISecurity in IoT and Big Data-Driven Enterprise -- 10 Implementation of Intrusion Detection System for Internet of Things Using Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Result and Analysis -- 5 Conclusion and Future Scope -- References -- 11 An Efficient Approach for Phishing Detection using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology Used -- 3.1 Data Acquisition -- 3.2 Classification before Feature Selection -- 3.3 Feature Selection -- 3.4 Classification after Feature Selection -- 3.5 Evaluation and Validation -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References. , 12 Use of Blockchain and Internet of Things for Securing Data in Healthcare Systems -- 1 Introduction -- 1.1 Blockchain Concept -- 1.2 Internet of Things -- 2 History of Blockchain -- 3 Working of Blockchain -- 4 Literature Survey -- 5 Proposed Methodology -- 6 Scope of Improvement in Model -- 7 Conclusion -- References -- 13 Asset Security in Data of Internet of Things Using Blockchain Technology -- 1 Introduction -- 1.1 Blockchain Concept -- 1.2 Internet of Things -- 1.3 Blockchain in Internet of Things -- 1.4 Key Blockchain Features for Building Trust in Organizations -- 2 Related Work -- 3 Asset Management in IoT Using Blockchain -- 4 Future Trends of Blockchain in IoT -- 5 Conclusion -- References -- 14 Review of Secure Distributed Range-Free Hop-Based Localization Algorithms in the Wireless Sensor Networks -- 1 Introduction -- 2 Localization Process -- 3 Localization Types -- 3.1 GPS Related -- 3.2 Communication-Based -- 3.3 Anchor Related -- 3.4 Range Related -- 3.5 Range-Free Schemes -- 4 Issues in Localization -- 4.1 Accuracy -- 4.2 Energy Consumption -- 4.3 Overhead -- 4.4 Optimization -- 4.5 Mobility -- 4.6 3D Deployment -- 4.7 Security -- 5 Need of Secure Localization -- 5.1 Security Requirements -- 5.2 Various Attacks in Localization -- 6 Secure Localization-Based Related Work -- 7 Multimedia Security and Authentication Techniques-Related Work -- 8 Research Gaps -- 9 Conclusion -- References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Schlagwort(e): Forschungsbericht ; Kernreaktorsicherheit ; Aderisolation ; PEP ; Isolierhülle ; Polyethylene ; Alterung ; Zerstörungsfreie Werkstoffprüfung
    Materialart: Online-Ressource
    Seiten: 1 Online-Ressource (127 Seiten, 7,10 MB) , Illustrationen, Diagramme
    Sprache: Deutsch , Englisch
    Anmerkung: Förderkennzeichen BMWi 1501567A+B , Verbundnummer 01183601 , Unterschiede zwischen dem gedruckten Dokument und der elektronischen Ressource können nicht ausgeschlossen werden , Sprache der Kurzfassungen: Deutsch, Englisch
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Digitale Medien
    Digitale Medien
    Copenhagen : International Union of Crystallography (IUCr)
    Acta crystallographica 38 (1982), S. 1584-1586 
    ISSN: 1600-5740
    Quelle: Crystallography Journals Online : IUCR Backfile Archive 1948-2001
    Thema: Chemie und Pharmazie , Geologie und Paläontologie , Physik
    Materialart: Digitale Medien
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Digitale Medien
    Digitale Medien
    Copenhagen : International Union of Crystallography (IUCr)
    Acta crystallographica 36 (1980), S. 147-150 
    ISSN: 1600-5740
    Quelle: Crystallography Journals Online : IUCR Backfile Archive 1948-2001
    Thema: Chemie und Pharmazie , Geologie und Paläontologie , Physik
    Materialart: Digitale Medien
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Digitale Medien
    Digitale Medien
    Copenhagen : International Union of Crystallography (IUCr)
    Acta crystallographica 36 (1980), S. 193-195 
    ISSN: 1600-5740
    Quelle: Crystallography Journals Online : IUCR Backfile Archive 1948-2001
    Thema: Chemie und Pharmazie , Geologie und Paläontologie , Physik
    Materialart: Digitale Medien
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Digitale Medien
    Digitale Medien
    Copenhagen : International Union of Crystallography (IUCr)
    Acta crystallographica 38 (1982), S. 335-337 
    ISSN: 1600-5740
    Quelle: Crystallography Journals Online : IUCR Backfile Archive 1948-2001
    Thema: Chemie und Pharmazie , Geologie und Paläontologie , Physik
    Materialart: Digitale Medien
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Digitale Medien
    Digitale Medien
    [s.l.] : Nature Publishing Group
    Nature 303 (1983), S. 687-689 
    ISSN: 1476-4687
    Quelle: Nature Archives 1869 - 2009
    Thema: Biologie , Chemie und Pharmazie , Medizin , Allgemeine Naturwissenschaft , Physik
    Notizen: [Auszug] US satellite Seasat synthetic aperture radar (SAR) imagery of the ocean depict a wide variety of ocean features ranging from mesoscale eddies to internal and surface waves. Furthermore SAR and side-looking airborne, or real-aperture, radar (SLAR) imagery of shallow water contain features that ...
    Materialart: Digitale Medien
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Digitale Medien
    Digitale Medien
    Springer
    Cellular and molecular life sciences 38 (1982), S. 167-176 
    ISSN: 1420-9071
    Quelle: Springer Online Journal Archives 1860-2000
    Thema: Biologie , Medizin
    Notizen: Summary Large efforts are directed towards production of ethanol from cellulosic biomass in order to reduce our dependence on petroleum based ethylene. No satisfactory process exists to date, however, which would make the aromatic molecules present in wood available to economic exploitation. A combination of physicochemical pretreatment of lignocellulose and selective microbial conversion of the mixture of aromatic monomers into a few phenolic products is outlined. Anaerobic microbial communities are employed since they offer thermodynamic and physiological characteristics necessary for efficient conversion. Under anaerobic conditions most of the carbon and energy initially present in the substrate can be recovered as useful products; oxidative losses as CO2 and H2O are minimized. The 3,4-disubstituted aromatic lignin monomers are converted to catechol while 3,4,5-trisubstituted monomers are mineralized to CH4 and CO2. Further studies are directed towards an understanding of the physiological functions of the populations participating in the conversion process, the reason for catechol recalcitrance and the tolerance of the community towards phenolic endproducts.
    Materialart: Digitale Medien
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Digitale Medien
    Digitale Medien
    Springer
    Plant and soil 77 (1984), S. 127-130 
    ISSN: 1573-5036
    Schlagwort(e): Glutamine synthetase ; Helianthus ; N utilization ; Nitrate ; Nitrate reduction
    Quelle: Springer Online Journal Archives 1860-2000
    Thema: Land- und Forstwirtschaft, Gartenbau, Fischereiwirtschaft, Hauswirtschaft
    Notizen: Summary It has been reported that in plants of nitrate-fedH. annuus, nitrate reductase activity (NRA) is restricted to the roots of the plant. With an improved extraction technique using a medium containing 2% casein and 1.5 g insoluble polyvinylpyrrolidone (PVP) per gram material, however, the leaves ofH. annuus showed a far greaterin vitro NRA (24.7±0.4 μmoles h−1 g fr.wt.−1) than did the roots (3.4±0.6 μmoles h−1 g fr.wt.−1).In vitro glutamine synthetase activity (GSA) was found to be greater in the leaves (27 μmoles h−1 g fr. wt.−1) than the root (5.6 μmoles h−1 g fr.wt.−1) using a standard extraction medium. With the addition of casein and PVP to the extraction medium, GSA increased to 141 μmoles h−1 g fr.wt.−1 in the leaves and 23 μmoles h−1 g fr.wt.−1 in the roots. It is thus essential to include both casein and PVP in the extracting medium of leaves and roots ofH. annuus when determiningin vitro NRA and GSA.
    Materialart: Digitale Medien
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Digitale Medien
    Digitale Medien
    Weinheim : Wiley-Blackwell
    Zeitschrift für anorganische Chemie 472 (1981), S. 149-161 
    ISSN: 0044-2313
    Schlagwort(e): Chemistry ; Inorganic Chemistry
    Quelle: Wiley InterScience Backfile Collection 1832-2000
    Thema: Chemie und Pharmazie
    Beschreibung / Inhaltsverzeichnis: Interactions between Hetero-π-Systems and Central Metals in Low Oxidation States: Stoichiometric Reactions of Azomethines and 1,3-Dienes with Nickel(0)Azomethines and 1,3-Dienes react with Ni(COD)2 under oxydative coupling to form different types of organo nickel(II) compounds. The route of this reactions depends on the nature of the azomethines and dienes and can be controlled by kinetic and thermodynamic parameters. The new complexes are investigated by IR, MS, and H-NMR measurements. The reaction of cinnamaldehydanil and dienes with Ni(COD)2 gives a binuclear complex. X-ray analysis shows that 2 C7N-chains are bonded to 2 Nickel(II) central atoms.
    Notizen: Azomethine und 1,3-Diene reagieren mit Ni(COD)2 unter oxidativer Kopplung der Komponenten zu verschiedenen Typen von Metallorganokomplexen. Der Verlauf dieser Reaktionen in Abhängigkeit von der Azomethin- und der Dienkomponente wird untersucht. Es wird gezeigt, daß sich die Reaktionen in Abhängigkeit von kinetischen und thermodynamischen Parametern steuern lassen und zu neuen Nickel(II)-organokomplexen führen, die mittels IR-, MS- und H-NMR-Messungen charakterisiert werden. Bei der Umsetzung von Zimtanil und Dienen mit Ni(COD) werden Zweikernkomplexe gebildet, in denen 2 C7N-Ketten die Zentralatome verknüpfen. Die Röntgenstrukturanalyse eines dieser Komplexe sichert den strukturellen Aufbau der Ketten.
    Zusätzliches Material: 4 Ill.
    Materialart: Digitale Medien
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...