Biometrics -- Biometrics: When Identity Matters -- Face Recognition: Technical Challenges and Research Directions -- Fingerprints: Recognition, Performance Evaluation and Synthetic Generation -- Recognising Persons by Their Iris Patterns -- Multiple Classifier Fusion for Biometric Authentication -- Performance Evaluation in 1 : 1 Biometric Engines -- Best Performing Biometric Engines -- Discuss…
Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.
Preface -- Chapter 1: Towards a critical understanding to the best practices of ICT in K-12 education in global context -- Chapter 2: How teachers and students depict interactive whiteboards and tablet PCs in a 9th grade classroom? -- Chapter3: A qualitative case study of tablet use in a high school in turkey -- Chapter 4: Teaching and learning effectiveness enhancement project “TLEEP” -- C…
Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings -- “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience -- A Privacy Preservi…
Network Security -- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience -- POSSET – Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Si…
Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling…
Learning and Fuzzy Systems -- Evolutionary Computation -- Intelligent Agents and Systems -- Intelligent Information Retrieval -- Support Vector Machine -- Swarm Intelligence -- Data Mining -- Pattern Recognition -- Applications.
This book explores how to tackle the challenges of urbanization through international lessons in sustainable development and smart growth strategies. As readers will discover, smart growth offers an approach to urbanization with the aim to: improve the efficiency of land use, protect the natural and cultural environment, promote economic prosperity and improve the quality of life. Authors addre…
Part i context and background -- Chapter 1 Social and cultural context of the emergence of Cultural studies in China -- Chapter 2 Intellective Background of the emergence of Cultural studies -- Part ii The main issues and the transformation of paradigms -- Chapter 3 Paradigms of popular culture studies -- Chapter 4 cultural studies and national identity -- Chapter 5 media studies in Chi…