The automatic Trust Management of self-adaptive Multi-Display Environments.- Malicious Pixels - Using QR Codes as Attack Vector.- A Virtual Performance Stage as a Space for Children to Create and Perform Stories.- Network Forensics: Detection and Mitigation of Botnet and Malicious Code via Darknet.- Trusted Log Management System.- Reasoning of Collaborative Human Behaviour in Security-Critical Work Practices: A Framework.- Mitigation ofWormhole Attack in Wireless Sensor Networks.- Protocol for Secure Access in Mobile Ad-hoc Network for Emergency Services.- A Lightweight Graph-Based Pattern Recognition Scheme in Mobile Ad Hoc Networks.- Security Framework for Mobile Banking.- Anonymous, Secure and Fair Micropayment System to Access Location-Based Services.- Privacy Preserving with A Purpose-based Privacy Data Graph.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.