Language: English
Published by VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3848431858 ISBN 13: 9783848431854
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 80.
Language: English
Published by Editorial Academica Espanola, 2012
ISBN 10: 3846557552 ISBN 13: 9783846557556
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 76.
Language: English
Published by LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3848431858 ISBN 13: 9783848431854
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Authentication Scheme for Dynamic Group Using Threshold Cryptography | Practical Approach | M. Amutha Prabakar | Taschenbuch | 80 S. | Englisch | 2014 | LAP LAMBERT Academic Publishing | EAN 9783848431854 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Language: English
Published by LAP LAMBERT Academic Publishing Dez 2011, 2011
ISBN 10: 3846557552 ISBN 13: 9783846557556
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -This text is a comprehensive study on password based authentication schemes in smart card applications. This study will provide an overview of authentication schemes and provide an new directions for the young researcher in authentication protocol design. This text covers following areas: RSA based password authentication schemes, ECC based password authentication schemes, ElGamal based password authentication schemes and Hash based password authentication schemesBooks on Demand GmbH, Überseering 33, 22297 Hamburg 76 pp. Englisch.
Language: English
Published by LAP LAMBERT Academic Publishing, 2011
ISBN 10: 3846557552 ISBN 13: 9783846557556
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Road Map on Password Based Authentication Schemes Using Smart Card | Research Focus | M. Amutha Prabakar (u. a.) | Taschenbuch | 76 S. | Englisch | 2011 | LAP LAMBERT Academic Publishing | EAN 9783846557556 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Language: English
Published by LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3846557552 ISBN 13: 9783846557556
Seller: Mispah books, Redhill, SURRE, United Kingdom
US$ 133.10
Quantity: 1 available
Add to basketPaperback. Condition: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Language: Spanish
Published by Ediciones Nuestro Conocimiento Feb 2023, 2023
ISBN 10: 6205748665 ISBN 13: 9786205748664
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -Las herramientas de minería de datos son el mejor enfoque para la identificación de delincuentes basándose en las características y la naturaleza del delito. En este libro, hemos propuesto un enfoque supervisado para identificar la lista de sospechosos utilizando medidas de similitud y el algoritmo de agrupación K-Medoids. El algoritmo de agrupación K-Medoids agrupa los delitos más estrechamente relacionados como un grupo individual y cada grupo tendrá un conjunto único de características. El conjunto de características únicas se utiliza para la identificación de los delincuentes mediante algoritmos de medida de similitud basados en la medida de distancia. El sistema propuesto consta de dos fases: la de entrenamiento y la de prueba. En este enfoque, hemos entrenado el sistema propuesto con un conjunto de datos supervisados con información recopilada de varios lugares de Tamil Nadu a través de datos disponibles en línea. En la fase de prueba, primero se identifica el clúster más cercano al delito de prueba mediante el algoritmo de agrupación K-Medoids y, a continuación, se identifica la lista de presuntos delincuentes utilizando la medida de similitud. La fase inicial de implementación y análisis del esquema propuesto proporciona buenos resultados y una alta precisión. El esquema propuesto se compara con el algoritmo de clustering K-Means relacionado con el mismo conjunto de instancias de entrenamiento y prueba.Books on Demand GmbH, Überseering 33, 22297 Hamburg 56 pp. Spanisch.
Language: French
Published by Editions Notre Savoir, 2023
ISBN 10: 6205748681 ISBN 13: 9786205748688
Seller: moluna, Greven, Germany
Condition: New.
Language: French
Published by Editions Notre Savoir Feb 2023, 2023
ISBN 10: 6205748681 ISBN 13: 9786205748688
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -Les outils d'exploration de données sont la meilleure approche pour l'identification des criminels basée sur les caractéristiques et la nature du crime. Dans cet ouvrage, nous avons proposé une approche supervisée pour l'identification de la liste des suspects en utilisant la mesure de similarité et l'algorithme de regroupement K-Medoids. L'algorithme de clustering K-Medoids regroupe les crimes les plus proches comme un groupe individuel et chaque groupe aura un ensemble unique de caractéristiques. L'ensemble des caractéristiques uniques est utilisé pour l'identification des criminels en utilisant des algorithmes de mesure de similarité basés sur la mesure de distance. Le système proposé comporte deux phases, la phase de formation et la phase de test. Dans cette approche, nous avons formé le système proposé à l'aide d'un ensemble de données supervisées avec des informations sur les crimes collectées dans différents endroits du Tamil Nadu grâce à des données disponibles en ligne. Dans la phase de test, nous identifions d'abord le groupe le plus proche du crime testé en utilisant l'algorithme de regroupement K-Medoids, puis nous identifions la liste des criminels suspects en utilisant la mesure de similarité. La phase initiale de mise en ¿uvre et d'analyse du schéma proposé fournit de bons résultats et une grande précision. Le schéma proposé est comparé à l'algorithme de clustering K-Means connexe avec le même ensemble d'instances de formation et de test.Books on Demand GmbH, Überseering 33, 22297 Hamburg 56 pp. Französisch.
Language: French
Published by Editions Notre Savoir, 2023
ISBN 10: 6205748681 ISBN 13: 9786205748688
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Une approche d'apprentissage supervisé pour l'identification criminelle | Utilisation des mesures de similarité et du regroupement K-Medoids | Amutha Prabakar | Taschenbuch | Französisch | 2023 | Editions Notre Savoir | EAN 9786205748688 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Language: Portuguese
Published by Edições Nosso Conhecimento, 2023
ISBN 10: 6205748762 ISBN 13: 9786205748763
Seller: moluna, Greven, Germany
Condition: New.
Seller: moluna, Greven, Germany
Condition: New.
Language: Italian
Published by Edizioni Sapienza Jan 2024, 2024
ISBN 10: 6205748797 ISBN 13: 9786205748794
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -Gli strumenti di data mining sono l'approccio migliore per l'identificazione dei criminali in base alle caratteristiche e alla natura del reato. In questo libro, abbiamo proposto un approccio supervisionato per l'identificazione di liste sospette di criminali utilizzando misure di similarità e l'algoritmo di clustering K-Medoids. L'algoritmo di clustering K-Medoids raggruppa i crimini più strettamente correlati come un gruppo individuale e ogni gruppo avrà un insieme unico di caratteristiche. L'insieme di caratteristiche uniche viene utilizzato per l'identificazione dei criminali utilizzando algoritmi di misura della somiglianza basati sulla misura della distanza. Il sistema proposto prevede due fasi, quella di addestramento e quella di test. In questo approccio, abbiamo addestrato il sistema proposto con un set di dati supervisionati con informazioni sulla criminalità raccolte da vari luoghi del Tamil Nadu attraverso i dati disponibili online. Nella fase di test, prima si identifica il cluster più vicino al crimine in esame utilizzando l'algoritmo di clustering K-Medoids e poi si identifica l'elenco dei sospetti criminali utilizzando la misura di similarità. La fase iniziale di implementazione e analisi dello schema proposto fornisce buoni risultati e un'elevata accuratezza. Lo schema proposto viene confrontato con il relativo algoritmo di clustering K-Means con lo stesso set di istanze di addestramento e di test.Books on Demand GmbH, Überseering 33, 22297 Hamburg 56 pp. Italienisch.
Language: German
Published by Verlag Unser Wissen Feb 2023, 2023
ISBN 10: 6205748622 ISBN 13: 9786205748626
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -Data-Mining-Tools sind der beste Ansatz für die Identifizierung von Kriminellen auf der Grundlage von Merkmalen und der Art des Verbrechens. In diesem Buch haben wir einen überwachten Ansatz zur Identifizierung der verdächtigen Liste von Kriminellen mit Hilfe von Ähnlichkeitsmaßen und dem K-Medoids-Cluster-Algorithmus vorgeschlagen. Der K-Medoids-Clusteralgorithmus gruppiert die enger verwandten Straftaten zu einer individuellen Gruppe, und jede Gruppe hat einen einzigartigen Satz von Merkmalen. Die eindeutigen Merkmale werden zur Identifizierung von Straftätern mit Hilfe von Ähnlichkeitsalgorithmen auf der Grundlage von Distanzmaßen verwendet. Das vorgeschlagene System besteht aus zwei Phasen, der Trainings- und der Testphase. Bei diesem Ansatz haben wir das vorgeschlagene System mit einem überwachten Datensatz trainiert, der Informationen über Verbrechen an verschiedenen Orten in Tamil Nadu enthält, die über online verfügbare Daten gesammelt wurden. In der Testphase wird zunächst der Cluster identifiziert, der dem Testverbrechen am nächsten liegt, indem der K-Medoids-Clusteralgorithmus verwendet wird, und dann die Liste der verdächtigen Verbrecher mit Hilfe eines Ähnlichkeitsmaßes identifiziert. Die erste Phase der Implementierung und Analyse des vorgeschlagenen Systems liefert gute Ergebnisse und eine hohe Genauigkeit. Das vorgeschlagene Verfahren wird mit dem verwandten K-Means-Clustering-Algorithmus mit demselben Satz von Trainings- und Testinstanzen verglichen.Books on Demand GmbH, Überseering 33, 22297 Hamburg 56 pp. Deutsch.
Language: Portuguese
Published by Edições Nosso Conhecimento Feb 2023, 2023
ISBN 10: 6205748762 ISBN 13: 9786205748763
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -Os instrumentos de mineração de dados são a melhor abordagem para a identificação criminal com base nas características e natureza do crime. Neste livro, propusemos uma abordagem supervisionada para a identificação da lista de suspeitos de crimes utilizando medidas de semelhança e algoritmo de cluster K-Medoids. O algoritmo de agrupamento de K-Medoids agrupa os crimes mais estreitamente relacionados como um grupo individual e cada grupo terá um conjunto único de características. O conjunto de características únicas é utilizado para a identificação de criminosos que utilizam algoritmos de medida de semelhança baseados na medida da distância. O sistema proposto tem duas fases, fase de treino e fase de teste. Nesta abordagem, treinámos o sistema proposto com um conjunto de dados supervisionado com informações recolhidas sobre crimes de vários locais de Nadu Tamil através de dados disponíveis online. Na fase de teste, primeiro identificar o agrupamento mais próximo do crime de teste utilizando o algoritmo de agrupamento de K-Medoids e depois identificar a lista de suspeitos de crime utilizando a medida de semelhança. A fase inicial de implementação e análise do esquema proposto proporciona bons resultados e elevada precisão. O esquema proposto é comparado com o algoritmo de agrupamento de K-Means relacionado, com o mesmo conjunto de formação e instâncias de teste.Books on Demand GmbH, Überseering 33, 22297 Hamburg 56 pp. Portugiesisch.
Language: Portuguese
Published by Edições Nosso Conhecimento, 2023
ISBN 10: 6205748762 ISBN 13: 9786205748763
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Uma abordagem de aprendizagem supervisionada para a identificação criminal | Utilização de Medidas de Semelhança e Agrupamento de K-Medoids | Amutha Prabakar | Taschenbuch | Portugiesisch | 2023 | Edições Nosso Conhecimento | EAN 9786205748763 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Taschenbuch. Condition: Neu. Ein Ansatz des überwachten Lernens für die Identifizierung von Straftätern | Verwendung von Ähnlichkeitsmaßen und K-Medoids Clustering | Amutha Prabakar | Taschenbuch | 56 S. | Deutsch | 2023 | Verlag Unser Wissen | EAN 9786205748626 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Language: English
Published by LAP LAMBERT Academic Publishing Jan 2014, 2014
ISBN 10: 3848431858 ISBN 13: 9783848431854
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Secret sharing is a technique for protecting sensitive data like cryptographic keys. This mechanism is used to distribute a secret value to a number of parties or users called shares. The shares are given to the parities or users involved in the group. These values have to be combined together to access the original values. Secret sharing is used in modern cryptography algorithms to reduce the risk in information leakage. Sharing a secret reduce the risk of compromising the value across several parties. Threshold or group oriented cryptography allows a group of users perform cryptographic operations such as encryption, decryption, signature etc. A trivial implementation of group-oriented cryptography can be achieved by concatenating secret sharing schemes and a single user cryptosystem. This book illustrate the basic RSA based Threshold Cryptography with numerical examples. This book is very useful for new research schollers working towards Threshold Cryptography. In this book, basic RSA based Threshold Cryptography is illustrated and stpes are explained with small numbers. 80 pp. Englisch.
Language: English
Published by VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3848431858 ISBN 13: 9783848431854
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 80 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam.
Language: English
Published by LAP LAMBERT Academic Publishing Dez 2011, 2011
ISBN 10: 3846557552 ISBN 13: 9783846557556
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This text is a comprehensive study on password based authentication schemes in smart card applications. This study will provide an overview of authentication schemes and provide an new directions for the young researcher in authentication protocol design. This text covers following areas: RSA based password authentication schemes, ECC based password authentication schemes, ElGamal based password authentication schemes and Hash based password authentication schemes 76 pp. Englisch.
Language: English
Published by VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3848431858 ISBN 13: 9783848431854
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND pp. 80.
Language: Spanish
Published by Ediciones Nuestro Conocimiento Feb 2023, 2023
ISBN 10: 6205748665 ISBN 13: 9786205748664
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Las herramientas de minería de datos son el mejor enfoque para la identificación de delincuentes basándose en las características y la naturaleza del delito. En este libro, hemos propuesto un enfoque supervisado para identificar la lista de sospechosos utilizando medidas de similitud y el algoritmo de agrupación K-Medoids. El algoritmo de agrupación K-Medoids agrupa los delitos más estrechamente relacionados como un grupo individual y cada grupo tendrá un conjunto único de características. El conjunto de características únicas se utiliza para la identificación de los delincuentes mediante algoritmos de medida de similitud basados en la medida de distancia. El sistema propuesto consta de dos fases: la de entrenamiento y la de prueba. En este enfoque, hemos entrenado el sistema propuesto con un conjunto de datos supervisados con información recopilada de varios lugares de Tamil Nadu a través de datos disponibles en línea. En la fase de prueba, primero se identifica el clúster más cercano al delito de prueba mediante el algoritmo de agrupación K-Medoids y, a continuación, se identifica la lista de presuntos delincuentes utilizando la medida de similitud. La fase inicial de implementación y análisis del esquema propuesto proporciona buenos resultados y una alta precisión. El esquema propuesto se compara con el algoritmo de clustering K-Means relacionado con el mismo conjunto de instancias de entrenamiento y prueba. 56 pp. Spanisch.
Language: English
Published by Editorial Academica Espanola, 2012
ISBN 10: 3846557552 ISBN 13: 9783846557556
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 76 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam.
Language: English
Published by LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3848431858 ISBN 13: 9783848431854
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Prabakar M. AmuthaDr. M. Amutha Prabakar received the B. E. degree in Computer Science and Engineering, in 2003 the M. E. in Computer Science and Engineering, in 2005. PhD in Cryptography and Network Security in 2012Secret shari.
Language: English
Published by Editorial Academica Espanola, 2012
ISBN 10: 3846557552 ISBN 13: 9783846557556
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND pp. 76.
Language: English
Published by LAP LAMBERT Academic Publishing, 2011
ISBN 10: 3846557552 ISBN 13: 9783846557556
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Prabakar M. AmuthaM. Amutha Prabakar received his B. E. degree in Computer Science and Engineering and M. E. in Computer Science and Engineering. He worked as a research associate in Smart and Secure Environment Lab sponsored by IIT .
Language: French
Published by Editions Notre Savoir Feb 2023, 2023
ISBN 10: 6205748681 ISBN 13: 9786205748688
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Les outils d'exploration de données sont la meilleure approche pour l'identification des criminels basée sur les caractéristiques et la nature du crime. Dans cet ouvrage, nous avons proposé une approche supervisée pour l'identification de la liste des suspects en utilisant la mesure de similarité et l'algorithme de regroupement K-Medoids. L'algorithme de clustering K-Medoids regroupe les crimes les plus proches comme un groupe individuel et chaque groupe aura un ensemble unique de caractéristiques. L'ensemble des caractéristiques uniques est utilisé pour l'identification des criminels en utilisant des algorithmes de mesure de similarité basés sur la mesure de distance. Le système proposé comporte deux phases, la phase de formation et la phase de test. Dans cette approche, nous avons formé le système proposé à l'aide d'un ensemble de données supervisées avec des informations sur les crimes collectées dans différents endroits du Tamil Nadu grâce à des données disponibles en ligne. Dans la phase de test, nous identifions d'abord le groupe le plus proche du crime testé en utilisant l'algorithme de regroupement K-Medoids, puis nous identifions la liste des criminels suspects en utilisant la mesure de similarité. La phase initiale de mise en oeuvre et d'analyse du schéma proposé fournit de bons résultats et une grande précision. Le schéma proposé est comparé à l'algorithme de clustering K-Means connexe avec le même ensemble d'instances de formation et de test. 56 pp. Französisch.
Language: English
Published by LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3848431858 ISBN 13: 9783848431854
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Secret sharing is a technique for protecting sensitive data like cryptographic keys. This mechanism is used to distribute a secret value to a number of parties or users called shares. The shares are given to the parities or users involved in the group. These values have to be combined together to access the original values. Secret sharing is used in modern cryptography algorithms to reduce the risk in information leakage. Sharing a secret reduce the risk of compromising the value across several parties. Threshold or group oriented cryptography allows a group of users perform cryptographic operations such as encryption, decryption, signature etc. A trivial implementation of group-oriented cryptography can be achieved by concatenating secret sharing schemes and a single user cryptosystem. This book illustrate the basic RSA based Threshold Cryptography with numerical examples. This book is very useful for new research schollers working towards Threshold Cryptography. In this book, basic RSA based Threshold Cryptography is illustrated and stpes are explained with small numbers.
Language: English
Published by LAP LAMBERT Academic Publishing Jan 2014, 2014
ISBN 10: 3848431858 ISBN 13: 9783848431854
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Secret sharing is a technique for protecting sensitive data like cryptographic keys. This mechanism is used to distribute a secret value to a number of parties or users called shares. The shares are given to the parities or users involved in the group. These values have to be combined together to access the original values. Secret sharing is used in modern cryptography algorithms to reduce the risk in information leakage. Sharing a secret reduce the risk of compromising the value across several parties. Threshold or group oriented cryptography allows a group of users perform cryptographic operations such as encryption, decryption, signature etc. A trivial implementation of group¿oriented cryptography can be achieved by concatenating secret sharing schemes and a single user cryptosystem. This book illustrate the basic RSA based Threshold Cryptography with numerical examples. This book is very useful for new research schollers working towards Threshold Cryptography. In this book, basic RSA based Threshold Cryptography is illustrated and stpes are explained with small numbers.Books on Demand GmbH, Überseering 33, 22297 Hamburg 80 pp. Englisch.
Language: English
Published by LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3846557552 ISBN 13: 9783846557556
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This text is a comprehensive study on password based authentication schemes in smart card applications. This study will provide an overview of authentication schemes and provide an new directions for the young researcher in authentication protocol design. This text covers following areas: RSA based password authentication schemes, ECC based password authentication schemes, ElGamal based password authentication schemes and Hash based password authentication schemes.