Advances on Broad-Band Wireless Computing, Communication and Applications (eBook)

Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications (BWCCA–2016) November 5–7, 2016, Korea
eBook Download: PDF
2016 | 1st ed. 2017
LVII, 903 Seiten
Springer International Publishing (Verlag)
978-3-319-49106-6 (ISBN)

Lese- und Medienproben

Advances on Broad-Band Wireless Computing, Communication and Applications -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary.

The aim of the volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing. This proceedings volume presents the results of the 11th International Conference on Broad-Band Wireless Computing, Communication And Applications (BWCCA-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea.

 

Welcome Message of BWCCA-2016 InternationalConference Organizers 6
Welcome Message from BWCCA-2016 WorshopsCo-Chairs 8
BWCCA-2016 Organizing Committee 10
BWCCA-2016 Reviewers 18
Welcome Message from MNSA-2016 InternationalSymposium Co-Chairs 20
MNSA-2016 Organizing Committee 22
Welcome Message from NGWMN-2016International Workshop Co-Chairs 23
NGWMN-2016 Organizing Committee 24
Message from MAPWC-2015 InternationalWorkshop Organizers 25
MAPWC-2016 Organizing Committee 26
Message from CWECS-2016 InternationalWorkshop Organizers 27
CWECS -2016 Organizing Committee 29
Message from RI3C-2016 International WorkshopOrganizers 30
RI3C-2016 Organizing Committee 32
Message from SCC-2016 International WorkshopOrganizers 33
SCC-2016 Organizing Committee 35
Message from LSNA-2016 InternationalWorkshop Organizers 36
LSNA-2016 Organizing Committee 37
BWCCA-2016 Keynote Talk 38
Contents 39
Part I 11th International Conference on Broad-Band Wireless Computing,Communication and Applications(BWCCA-2016) 48
1C++ Memory Check tool based onDynamic Binary Instrumentation Platform 49
Abstract. 49
1. Introduction 49
2. DynamoRIO Introduction 50
2.1 DynamoRIO System Details 50
2.2 The efficiency of DynamoRIO 51
2.2.2 Direct link 51
2.2.3 Indirect branch 52
2.3 Transparent 52
3. Memory Check Tools for C++ 52
3.1 Shadow Memory 53
3.2 Error detection 54
3.2.1 Memory leak 54
3.2.2 Buffer overflow 54
3.2.3 Reading and writing to unreachable memory. 54
3.2.4 Reading the undefined memory 54
3.2.5 Library functions and system calls 55
4. Efficiency and accuracy 55
4.1 Efficiency 55
4.2 Accuracy 56
5. Conclusion 56
6. Acknowledgement 56
References 56
2A program behavior recognition algorithm based on assembly instruction sequence similarity 58
Abstract. 58
1 Introduction 58
2 Structure of assembly instruction 59
3 Abstract coding of assembly instructions 59
4 Similarity measurement algorithm of assembly instructions 61
5 Similarity measurement algorithm of assembly instruction sequence 61
6 Optimum of algorithm 63
6.1 Reduce of time complexity 63
6.2 Reduce of space complexity 63
7 Experimental results and analysis 64
8 Conclusion 64
Acknowledgments. 65
References 65
3Energy-aware Migration of Virtual Machines in a Cluster 66
Abstract 66
1 Introduction 67
2 System Model 68
3 Power Consumption and Computation Models 69
3.1 MLPCM and MLC Models 69
3.2 Computation Model of a Virtual Machine 70
4 A Virtual Machine Migration (VMM) Algorithm 72
5 Evaluation 73
6 Concluding Remarks 75
References 76
4An Energy-efficient Migration Model of Processes with Virtual Machines in a Server Cluster 78
Abstract 78
1 Introduction 78
2 System Model 79
2 System Model 79
3 Power Consumption and Computation Models 81
3.1 MLPCM Model 81
3.2 MLCM Model 82
4 Energy-efficient Migration of Virtual Machines 83
4.1 Estimation Model 83
4.2 VM Selection Algorithm 84
5 Evaluation 85
6 Concluding Remarks 87
Acknowledgment 88
References 88
5Energy-aware Server Selection Algorithms for Storage and Computation Processes 90
Abstract 90
1 Introduction 90
2 Multi-level Power Consumption and Computation Models 91
2.1 MLPCMG Model 91
2.2 MLCMG Model 93
2.3 Estimation Model 94
3 Server Selection Algorithms 96
3.1 LEAG Algorithm 96
3.2 GEAG Algorithm 96
4 Evaluation 97
5 Concluding Remarks 98
Acknowledgment 100
References 100
6Topic-based Synchronization (TBS) Protocols to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems 102
Abstract 102
1 Introduction 102
2 Information Flow in TBAC Model 104
2.1 TBAC Model 104
2.2 Information Flow Relations 105
3 Synchronization Protocols 106
3.1 Subscription-based Synchronization (SBS) Protocol 106
3.2 Subscription Initialization SBS (SI-SBS) Protocol 108
3.3 Topic-based Synchronization (TBS) Protocol 108
3.4 Subscription Initialization TBS (SI-TBS) Protocol 109
4 Evaluation 110
5 Concluding Remarks 111
Acknowledgment 112
References 112
7Load-aware ACB Scheme for M2M Traffic in LTE-A Networks 114
Abstract. 114
1 Introduction 114
2 System Model 115
2.1 Access Class Barring 116
2.2 The Random Access Procedure 117
3 Load-aware ACB Scheme 118
3.1 Load-estimation Scheme 118
3.2 The Adjustment of the ACB Factor p 120
4 Simulation Results 121
4.1 Simulation Parameters 121
4.2 Comparison of Load-estimation Schemes 122
4.3 Comparison of Load-aware ACB Scheme and Traditional ACB Scheme 123
5 Conclusions 124
References 125
8An Energy-Efficient Macro-assisted Sleep-Mode Scheme in Heterogeneous Networks 126
Abstract. 126
1 Introduction 126
2 System Model 128
2.1 System Architecture 128
2.2 Energy Model 129
3 Energy Efficient Macro Assisted Sleep Mode Scheme 129
3.1 Problem Description 129
3.2 An Energy Efficient Macro Assisted Sleep Mode Scheme 131
4 Evaluation Results 133
5 Conclusions 135
Acknowledgement 135
References 135
9 A QoE Estimation Model for Video Streaming over 5GMillimeter Wave Network 137
Abstract. 137
1 Introduction 137
2 Related work 139
2.1 5G millimeter wave simulation work with video streaming system 139
2.2 Quality of Experience of video streaming service 140
3 The architecture of video streaming system over 5G network 141
3.1 5G millimeter wave simulation network for our video streaming system 141
3.2 Estimation model for video streaming system with Evalvid tools 143
4 Results and Analysis 144
5 Conclusions 146
Acknowledgments: 147
References 147
10An Energy-Efficient Process Replication Algorithm in Virtual Machine Environments 149
Abstract 149
1 Introduction 149
2 System Model 151
2.1 Computation Model of a Virtual Machine 151
2.2 Power Consumption Model of a Server 153
3 Selection Algorithm 153
4 Evaluation 155
5 Concluding Remarks 158
References 158
11Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Distributions and Routing Protocols Considering TCP 159
Abstract 159
1 Introduction 160
2 RelatedWork 161
3 Architectures of WMNs 161
4 Overview of Routing Protocol 162
4.1 HWMP 162
4.2 OLSR 162
5 Simulation Description and Design 162
5.1 Positioning of mesh routers by WMN-GA system 162
5.2 Simulation Description 163
5.3 NS-3 164
6 Simulation Results 166
7 Conclusions 167
References 170
12Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Normal and Uniform Distributions, DCF and EDCA Functions 172
Abstract 172
1 Introduction 173
2 Architectures of WMNs 174
3 Simulation Description and Design 174
3.1 GUI of WMN-GA System 174
3.2 Positioning of mesh routers by WMN-GA system 175
3.3 Simulation Description 175
3.4 NS-3 177
3.5 Overview of DCF and EDCA Protocols 179
3.5.1 DCF 179
3.5.2 Enhanced Distributed Channel Access (EDCA) 179
3.6 Overview of OLSR Routing Protocol 180
4 Simulation Results 181
5 Conclusions 181
References 184
13A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering Uniform Distribution, Transmission Rate and OLSR Protocol 186
Abstract 186
1 Introduction 186
2 Architectures of WMNs 187
3 Simulation Description and Design 188
3.1 GUI of WMN-GA System 188
3.2 Positioning of mesh routers by WMN-GA system 188
3.3 Simulation Description 189
3.4 NS-3 189
3.5 Overview of OLSR Routing Protocol 192
4 Simulation Results 192
5 Conclusions 193
References 193
14Effect of Node Density and Node Movement Model on Performance of a VDTN 196
Abstract 196
1 Introduction 197
2 DTNs and Routing Protocols 198
2.1 DTN Overview 198
2.2 Routing Protocols 198
3 Simulation system and design 200
4 Simulation Results 200
5 Conclusions 203
References 204
15A Fuzzy-Based Simulation System for Actor Selection in Wireless Sensor and Actor Networks Considering as a New Parameter Density of Actor Nodes 205
Abstract 205
1 Introduction 206
2 WSAN 207
2.1 WSAN Challenges 207
2.2 WSAN Architecture 207
3 Proposed System Model 208
3.1 Problem Description 208
3.2 System Parameters 209
3.3 System Implementation 210
3.4 Description of FLC 211
4 Simulation Results 213
5 Conclusions and FutureWork 214
References 214
16A Fuzzy-based System for Qualified Voting in P2P Mobile Collaborative Team 217
Abstract 217
1 Introduction 218
2 Scenarios of Collaborative Teamwork 219
2.1 Collaborative Teamwork and Virtual Campuses 219
2.2 Mobile Ad hoc Networks (MANETs) 220
3 VoteWeights 221
3.1 Votes with Embedded Weight 221
3.2 Voting Score 221
4 Application of Fuzzy Logic for Control 221
4.1 FC 222
4.2 Linguistic Variables 222
4.3 FC Rules 222
4.4 Control Knowledge Base 223
4.5 Defuzzification Methods 223
5 Proposed Fuzzy-based Peer Voting Score System 224
6 Simulation Results 225
7 Conclusions and Future Work 227
References 227
17An Integrated Simulation System Considering WMN-PSO Simulation System and Network Simulator 3 229
1 Introduction 229
2 Architectures of WMNs 230
3 Node Placement Problem in WMNs 231
4 Proposed WMN-PSO System 232
4.1 PSO 232
4.2 WMN-PSO System for Mesh Router Node Placement 233
6 Simulation 236
7 Conclusions 237
Acknowledgement 238
References 238
18Impact of Delayed Acknowledgment for Message Suppression in Vehicular-DTN 241
Abstract 241
Key words: 241
1 Introduction 241
2 Delay/Disruption Tolerant Networking 242
3 EMSC Considering Delayed Acknowledgment 243
4 Simulation System Design 245
4.1 Scenario Settings 245
4.2 IEEE802.11p 246
4.3 Mobility Model for Vehicular-DTN 246
4.4 Application Settings 247
5 Simulation Results 248
6 Conclusions 249
References 249
19Reputation based Access Control in Social Networks for Persona Management 251
Abstract. 251
1 Introduction 251
2 Background 252
2.1 Access Control 252
2.2 Reputation 252
3 Proposed Method 253
3.1 A Method of Calculating Reputation 253
3.2 Rules of Reputation based Access Control 254
4 Simulation and Results 255
5 Conclusion 256
Acknowledgments. 256
References 256
20The Automatic Text Summarization Using Semantic Relevance And Hierarchical Structure Of Wordnet 257
Abstract. 257
1 Introduction 257
2 Related Work 258
3 LEXICAL CHAIN-BASED AUTOMATIC DOCUMENT SUMMARIZATION 259
4 Experiment 263
5 Conlusiins and suggestions for further work 264
Acknowledgment 264
References 264
21 Korean spelling error correction using a Hangulsimilarity algorithm 265
Abstract. 265
1 Introduction 265
2 Related Work 266
3 Methods 267
3.1 Korean alphabet similarity algorithm 267
3.2 Correct word extraction 268
3.3 Spelling error correction 269
3.4 Conclusions and Directions for 269
3.5 Conclusions and Directions for Subsequent Studies 271
ACKNOWLEDGMENT 271
References 271
22 A Comprehensive Security Analysis Checksheetfor OpenFlow Networks 272
Abstract. 272
Keywords: 272
1 Introduction 272
2 Organizing SDN Security Threats 273
2.1 Seven Threat Vectors of Kreutz et al. 274
2.2 SDNSecurity.org SDN Threat Analysis 274
2.3 Reported Vulnerabilities of OpenFlow 274
3 Our Proposal 275
3.1 OpenFlow Network System Security Threat List 275
3.2 OpenFlow Network System Security Assessment Checksheet 277
4 Use of OpenFlow Network System Security Assessment 279
4.1 Out SDN/OpenFlow Testbed and Security Assessment 279
4.2 Quantitative Evaluation of DoS Scenario 1 (PACKET INFlooding) 279
4.3 Quantitative Evaluation of DoS Scenario 2 (FlowRule Flooding 281
5 Concluding Remarks 283
Acknowledgement 283
References 283
23Enhanced energy conditioned mean square error algorithm for wireless sensor networks 284
Abstract 284
1 Introduction 284
2 Related work 285
3 Motivation 287
4 E-ECMSE 287
4.1 Mathematical Formulation 290
5 Simulations and discussions 291
6 Conclusion and future work 294
References 294
24In-Vehicle Cloudlet Computing based on Delay Tolerant Network Protocol for Disaster Information System 296
Abstract. 296
Keywords: 296
1 Introduction 296
2 Related Works 297
3 Proposed System Configuration 298
4 System Architecture 299
5 Disaster Information 300
6 Prototype System 301
6.1 Prototype System Configuration 301
6.2 Cloud Stack 302
7 Performance Evaluation 302
7.1 Performance of LDC 302
7.2 End-to-End Response time between LS and GDC 304
8 Conclusions and future work 307
Acknowledgment. 307
References 307
25Towards Heuristic Algorithms: GA, WDO, BPSO, and BFOA for Home Energy Management in Smart Grid 308
Abstract 308
1 Introduction 308
2 Related Work 309
3 HEM system and Heuristic algorithms 312
3.1 HEM system 312
3.2 Heuristic Algorithms 313
3.2.1 BFOA 313
3.2.2 GA 315
3.2.3 BPSO 316
3.2.4 WDO 317
Conclusion 318
References 318
26 Network lifetime maximization via energy hole alleviation in wireless sensor networks 320
Abstract 320
1 Introduction 320
2 Related Work 321
3 NEHA: The Proposed Scheme 323
3.1 Data Amount at Stage So 326
3.2 Energy Consumption at Stage So 327
3.3 Avoiding Energy Hole Problem 328
4 Operation 328
5 Conclusion and Future Work 329
References 330
27 A Smart Card-Based Three-Party Quantum KeyDistribution Protocol 332
Abstract. 332
Keywords. 332
1 Introduction 332
2 Related Works 333
2.1 Quantum Key Distribution Protocol BB84 334
2.2 The3QKDPMA Protocol 334
2.3 The 3PAQKD-TB Protocol 335
2.4 The Secure User Authentication Protocol Based on the Smart Card 335
2.4.1 System Setup Phase 336
2.4.2 Registration Phase 336
2.4.3 Login Phase 336
2.4.4 Authentication Phase 337
2.4.5 Password Change Phase 338
3 Method 338
3.1 Login Phase 338
3.2 Authentication and Key Generation Phase 339
4 Security Analysis 340
5 Conclusions 341
References 341
28 TCP with network coding meets loss burstinessestimation for lossy networks 343
Abstract 343
1 Introduction 343
2 Network coding fundamental 345
3 The proposed method 347
3.1 Estimating the link loss rate and the burstiness loss rate 347
3.2 Estimating the network coding parameters 349
3.3 Adjusting the network coding parameter 351
4 Simulation result 352
5 Conclusions 353
Acknowledgements 354
References 354
29 Reduction of Network Traffic by Using the Peer Cache Mechanism in Co-located CollaborativeWeb Search on Smartphones 355
Abstract 355
1 Introduction 355
2 Related Work 356
3 Reduction of Network Traffic in CollaborativeWeb Search 356
3.1 Use Case 356
3.2 Peer Cache Mechanism 357
3.2.1 Overview 357
3.2.2 Referencing theWeb Cache of Other Terminals 357
4 Evaluation 359
4.1 Overview of the Experiment 359
4.2 Result 360
5 Conclusion 362
References 362
30 Building a Content Delivery Network among Tens of Nearby Devices Using Multihop WirelessCommunication 363
Abstract 363
1 Introduction 363
2 Contents Delivery among Group of Devices 364
2.1 Content Delivery among Multiple Nearby Devices 364
2.2 Related Work 365
2.2.1 Wireless Communication between Devices 365
2.2.2 Utilization of Peripheral Devices 365
2.3 Multipeer Connectivity Framework 366
3 Content Delivery Network 366
3.1 Network Overview 366
3.2 Composing Network among Multiple Nearby Devices 367
3.3 Delivering Contents 367
4 Evaluation Experiment 368
4.1 Required Time for Contents Delivery 368
4.1.1 Details of the Experiment 368
4.2 Performance Evaluation for Variations of the NetworkTopology 369
4.2.1 Content of Experiment 369
4.2.2 Experimental result 370
4.1.2 Experimental Result 368
5 Conclusion 370
References 370
31A Workbook Design for Fill-in-Blank Problems in Java Programming Learning Assistant System 371
Abstract 371
1 Introduction 371
2 RelatedWorks 373
3 Overview of Extended Blank Element Selection Algorithm 374
3.1 Vertex Generation for Constraint graph 374
3.2 Edge Generation for Constraint graph 374
3.2.1 Group Selection Category 375
3.2.2 Pair Selection Category 376
3.2.3 Prohibition Category 376
3.3 Compatibility Graph Generation 377
3.4 Maximal Clique Extraction of Compatibility Graph 377
3.5 Fill-in-blank Problem Generation 378
4 Workbook Design of Fill-in-blank Problems 378
4.1 Contents of Workbook 378
4.2 Trial Application Results to Novice Students 379
5 Conclusion 381
References 381
32 Design and implementation of software consistencydetection system based on Netty framework 383
Abstract. 383
1 Introduction 383
2 Related work 384
2.1 Software digital watermarking technology 384
2.2 Consistency detection technology based on the License 384
2.3 Consistency detection technology based on the USB can 385
3 Design and implementation 385
3.1 Design Principle 385
3.2 The Framework 386
3.3 Design And Implementation Of Consistency Detecting 388
4 Experimental verification 389
5 Conclusion 391
6 Acknowledgement 391
References 391
33The generation of XSS attacks developing in the detect detection 392
Abstract. 392
1 Introduction 392
2 Web Application Vulnerabilities Positioning Frames 393
3 Generating the Test Data 394
3.1 Pre-generated attack vectors 395
3.2 Agreement generated automatically attack vectors 395
3.2.1 Protocol analysis 396
3.2.2 Data generation 397
4 Evaluation 398
5 Conclusion 399
Acknowledgments. 399
REFERENCES 399
34 Searchable Public Key Encryption Scheme with DataIntegrity Checking 401
Abstract. 401
1 Introduction 401
2 Related Work 402
2.1 Complexity Assumption 402
2.1.1 Bilinear Map 402
2.1.2 Bilinear Diffie-Hellman 402
2.2 Searchable Encryption 403
3 The Proposed Scheme 403
3.1 Description of the Scheme 403
3.2 Security Analysis 405
3.3 Efficiency 406
4 Conclusion 407
Acknowledgments. 407
References 407
35An Attack Detection System for Multiple Web Applications Based on Big Data Platform 409
Abstract. 409
1 Introduction 409
2 Related Work 410
3 The Proposed System 411
3.1 Data Collection Subsystem 411
3.2 Protocol Parsing Subsystem 411
3.3 Big Data Storage Subsystem 412
3.4 Offline Learning Subsystem 412
3.5 Online Detection Subsystem 413
3.6 Visualization Subsystem 413
4 Conclusion and Future Work 413
References 414
36Cognitive Countermeasures against BAD USB 415
Abstract. 415
1 Introduction 415
2 Related Works 417
2.1 Overview of BAD USB 417
2.2 Attack Scenarios of BAD USB 417
2.3 Existing Countermeasures of BAD USB 418
3 BAD USB Countermeasures for the Detection of the Manipulated Firmware 419
3.1 Driver-installation Process on Microsoft Windows Platform 419
3.2 BAD USB-prevention Method for which the driver integrity is verified 421
3.3 BAD USB-prevention Method for which the Firmware Integrity is verified 422
4 Conclusions 423
Acknowledgments. 423
References 423
37Security Assessment on the Mouse Data using MouseLoggers 425
Abstract. 425
1 Introduction 425
2 Related Works 426
2.1 Mouse Loggers 426
2.2 Image-based Authentication 427
3 Security Assessment on the Mouse Data 427
3.1 Security Assessment on the E-Commerce Services 428
3.2 Security Assessment on the Internet-banking Services 429
4 Conclusions 430
References 431
38 Security Assessment of Keyboard Data Based onKaspersky Product 432
Abstract. 432
1 Introduction 432
2 Related Research 433
2.1 Keyboard-data Transmission Process 433
2.2 Keyboard-security Program (Kaspersky) 433
2.3 Existing Keyboard-attack Technique 434
3 Keyboard-data Safety Rating 434
3.1 Safety Assessment of Keyboard Data for SNS 435
3.2 Safety Assessment of Keyboard Data for Mail Service 435
3.3 Security Assessment of Keyboard Data for Banking Service 436
4 Conclusions 437
Acknowledgments. 437
References 437
39The Detection Technology of LTE based Stratified Fuzz 438
Abstract 438
1 Introduction 438
2 LTE Protocol Layer Architecture 439
2.1 Architecture of LTE Protocol Layer 439
2.2 GTP Protocol 440
2.3 The Characteristics of LTE Protocol 441
3 The Algorithm of Stratified Fuzzing 441
3.1 Policy of Stratification 441
3.2 Policy of Priority 442
4 Experiment 443
4.1 Experimental Platform 443
4.2 Result of Experiment 444
4.3 Vulnerability Analysis 445
5 Conclusion 445
Acknowledgment 445
Reference 445
40 Secure Multi-Protocol Mapping Gatewayin Smart Grid 447
Abstract. 447
1 Introduction 447
2 Relevant Standardization Activities 448
2.1 IEC 62351 Security Standards 448
2.2 IEEE 1815.1 Standard 449
3 Implementation of Secure Multi-Protocol Mapping Gateway 449
3.1 Hardware Security Module 451
3.2 Many Core Platform (MCP) 452
3.3 Mapping Procedure and Implementation 452
4 Conclusions 454
Acknowledgments. 454
References 454
41An Adaptive DoS Attack Mitigation Measure for Field Networks in Smart Grids 455
Abstract 455
1 Introduction 455
2 The Previous Measure and its Limitations 457
3 The Proposed Method 458
3.1 Building a neighbor list 458
3.2 Monitoring and Detection of Routing Misbehavior 460
3.3 Adjustment of threshold for the packet drop ratio 461
4 Experiment results 462
5 Conclusion 464
Acknowledgements 464
References 464
42Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its Infrastructures 465
Abstract. 465
1 Introduction 465
2 Current status of self-driving cars and infrastructure 467
2.1 Current status of technological development in South Korea 467
2.1.1 Current status of technological development in self-driving cars 467
2.1.2 Cooperative driving technology 467
3.1 Security threats against self-driving cars 468
3.1.1 Physical vulnerability 468
3.1.2 Encryption and authentication 468
3.1.3 Access control 468
3.2 Security threats against self-driving car infrastructure 469
3.2.1 Network scale 469
3.2.2 Operation of devices and systems 469
3.2.3 Denial of Service 469
2.2 Current status of technological development in the USA 467
2.3 Current status of technological development in Europe 468
3 Security threats against self-driving cars and infrastructure 468
4 Possible attack scenarios and analysis on the impact 469
4.1 Intrusion scenarios through networks 469
4.2 Intrusion scenarios through physical access 470
4.3 IoT control attack scenario in the home network using V2Icommunication spoofing 471
4.4 V2V communication paralysis through OCSP server attack atinfrastructure data transmission and reception environments 472
4.5 Scenario of communication jamming attack inside V2V environments 473
4.6 Scenario of vehicle control attack using control App of self-driving car 474
5 Current status of countermeasure technology development 475
5.1 Privacy protective authentication technology 475
5.2 Security technology of V2X service integration for self-driving cars 475
5.3 ProtectivX technology 475
5.4 PRESERVE technology 475
6 Direction and strategy of future technological development 476
6.1 Implementation of certificate-based certification system 476
6.2 IDS/IPS embedded with aulighthentication and lightweight encryptionalgorithm 476
6.3 Ultra-lightweight hardware security module for key management andinternal encryption operation 477
6.4 Detection and recovery against ECU security threat 477
6.5 Construction of security testbed 477
7 Conclusion and future research 477
Acknowledgments. 478
References 478
43Lightweight IEC 61850 Secure Communication Module for Microgrids 479
Abstract. 479
1 Introduction 479
2 Microgrids 480
3 Lightweight IEC 61850 Secure Module 481
4 Performance Test 484
5 Conclusion 486
Acknowledgments. 486
References 486
44A new approach to building a disguised server using the honey port against general scanning attacks 488
Abstract 488
1 Introduction 488
2 Background 489
2.1 Port Scanning 489
2.2 Port Knocking 490
2.3 Single Packet Authorization 491
3 Proposal Algorithm 491
3.1 Listener 493
3.1.1 Packets going from inside to outside 493
3.1.2 Packets going from outside to inside 494
3.2 Sender 495
3.2.1 Packets going from inside to outside 495
3.2.2 Packets going from outside to inside 496
3.3 Spoofer 497
4 Result 498
5 Conclusion 499
References 500
45 Password Authentication Using One-Time Key-BasedSignature and Homomorphic Encryption 501
Abstract. 501
1 Introduction 501
2 Preliminaries 502
2.1 Traditional Password-based Authentication 502
2.2 Homomorphic Encryption 503
3 Proposed Method 503
3.1 System Model 503
3.2 Proposed Password-based Authentication Method 504
4 Soundness and Completeness of Proposed Method 507
5 Conclusion 507
Acknowledgments. 508
References 508
46 On-line Voting System with Illegal Ballot Filtering Using Homomorphic Encryption 509
Abstract. 509
1 Introduction 509
2 Preliminaries 509
2.1 On-line Voting 509
2.2 Homomorphic Encryption 510
3 Proposed Voting Protocol 511
3.1 Initialization Stage 511
3.2 Collection Stage 511
3.3 Decision Stage 512
3.4 Example 512
4 Security Analysis 513
4.1 Completeness 513
4.2 Soundness 513
4.3 Privacy 514
4.4 Support for Second Voting 514
4 Security Analysis 515
Acknowledgments. 515
References 515
47Real-Time Malicious Script Blocking Technology at theHost-Level 517
Abstract. 517
1 Introduction 517
2 Paper Preparation 518
3 Proposed Technology 520
4 Analyzing the result of applying the proposed technology 522
5 CONCLUSION 523
Acknowledgments. 524
References 524
48A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic Networks 525
Abstract 525
1 Introduction 525
2 Related Work 526
2.1 ProPHet 526
2.2 EDR 527
2.3 HBPR 527
3 Proposed Scheme: P-EDR 528
3.1 Motivation 528
4 Simulation and Results 529
5 Conclusion 533
References 533
49Comparison of Biometric and LinguisticSecret Sharing Protocols 534
Abstract. 534
1 Introduction 534
2 An Idea of Linguistic Threshold Schemes 535
3 Information Division Using Biometric Threshold Schemes 535
4 Comparison of Linguistic and Biometric Sharing Protocols 536
5 Conclusions 536
Acknowledgments 537
References 537
50Concealing Additional Secrets Using Sharing Approach in Steganography 539
Abstract. 539
1 Introduction 539
2 Multi-secret Fuzzy Vault 540
3 Concealing Additional Shared Secrets 541
4 Example 542
5 Conclusions 543
Acknowledgments. 544
References 544
51Enhance Robotics ability in Hand Gesture Recognition by Using Leap Motion Controller 545
Abstract. 545
1 Introduction 545
2 Problem Statement 546
3 Objectives 546
4 Related Work 547
4.1 Hand gestures recognition and robotic 547
4.2 Leap Motion Controller 550
5 Methodology 551
5.1 Gesture recognition Methodology 552
5.2 Testing Methodology 553
6 Conclusion 554
References 554
52 Fast Signature Verification with Shared Implicit Certificates for Vehicular Communication 556
Abstract. 556
1 Introduction 556
2 Preliminaries 557
2.1 Notations 557
2.2 Implicit Certificate 557
2.3 Modified ECDSA 558
2.4 Batch Verification 559
3 Proposed Method 559
3.1 Sharing Public Key Extraction Processes 560
3.2 Performance Analysis for Public Key Extraction 561
4 Performance Analysis for Signature Verification 562
4.1 Cost Analysis 562
4.2 Comparison using practical values 563
5 Conclusion 564
Acknowledgments. 564
References 564
53Design of an Adhoc Testbed for IoT and WSAN Applications using Raspberry Pi 565
Abstract 565
1 Introduction 565
2 Related Work 566
3 Overview of BATMAN Routing Protocol 567
4 Design and Implementation of MANET Testbed 568
4.1 Testbed Description 568
4.2 Experimental Scenario Settings 569
4.3 Considerations 570
5 Experimental Results 571
6 Conclusions and FutureWorks 571
References 575
Part II The 18-th International Symposiumon Multimedia Network Systems and Applications (MNSA-2016) 577
54Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean Shift Clustering Approach Considering Electroencephalogram Data 578
Abstract 578
1 Introduction 578
2 Overview of IoT and ULE 579
2.1 Internet of Things (IoT) 579
2.2 Ubiquitous Learning Environment (ULE) 580
2.3 Role of IoT in ULE 580
3 The Mean-shift Clustering Algorithm 581
4 Testbed Description 583
4.1 MindWave Mobile 583
4.2 SmartBox Description 584
5 Simulation Results 584
6 Conclusions 585
References 586
55A Testbed for Admission Control in WLAN: A Fuzzy Approach and Its Performance Evaluation 587
Abstract 587
1 Introduction 587
2 IEEE 802.11 588
2.1 EDCF 589
2.2 HCCA 590
3 Related Work 590
3.1 Measurement-based Admission Control 590
3.2 Model-based Admission Control 591
3.3 Measurement-aided, Model-based Admission Control 591
4 Application of Fuzzy Logic for Control 591
4.1 FC 591
4.2 Linguistic Variables 592
4.3 FC Rules 592
4.4 Control Knowledge Base 593
4.5 Defuzzification Methods 593
5 Implemented Testbed 593
6 Experimental Results 597
7 Conclusions 597
References 598
56Simple Energy-efficient Server Selection Algorithm in a Scalable Cluster 600
Abstract 600
1 Introduction 600
2 Power Consumption and Computation Models 601
2.1 MLPCM Model 601
2.2 MLCM Model 602
2.3 Estimation Model 604
3 Energy-aware Server Selection Algorithms 605
3.1 Locally Energy-aware (LEA) Algorithm 605
3.2 Modified Globally Energy-aware (MEA) Algorithm 605
3.3 Simple Energy-aware (PEA) Algorithm 606
4 Evaluation 607
4.1 Environment 607
4.2 Evaluation Results 608
5 Concluding Remarks 609
References 610
57An Energy-efficient and Reliable Protocol in Wireless Networks 612
Abstract 612
1 Introduction 612
2 System Model 613
3 Fuzzy-based Trustworthiness 614
4 TBAH Protocol 616
5 Evaluation 617
6 Concluding Remarks 618
Acknowledgment 618
References 618
58Proposal of Collaborative Object Tracking Methods by Multi-Drones for Flight Surveillance Systems 620
Abstract. 620
1 Introduction 620
2 Related Works 621
3 The Proposed Methods 622
4 The Prototype System 624
5 The Conclusion and Future Study 626
References 626
59 Performance Evaluation of a DTN Based Multi-hopNetwork for Disaster Information Transmission bySmart Devices 628
Abstract. 628
Keywords: 628
1. Introduction 628
2. Rerated Works 629
3. The proposed system 630
4. Network protocol 632
5. Prototype system 634
6. Performance Evaluation and Discussions 635
7. Conclusions 637
Acknowledgement 638
References 638
60OpenFlow Mesh for Metabolic Computing 639
Abstract. 639
1 Introduction 639
2 Metabolic Computing 640
3 Design of OpenFlow Mesh based Metabolic Architecture 642
3.1 Requirements 642
3.2 OpenFlow 2+1D Mesh 642
3.3 OpenFlow Mesh based PQ 643
3.4 Routing 644
3.5 Extending 645
4 Conclusions 646
References 646
Part III The 9-th International Workshopon Next Generation of Wireless and Mobile Networks (NGWMN-2016) 647
61Performance Evaluation of an AmI Testbed for Improving QoL: Evaluation Using Clustering Approach Considering Parallel Processing 648
Abstract 648
1 Introduction 648
2 Ambient Intelligence (AmI) 649
3 The k-means Clustering Algorithm 650
4 Parallel Processing 651
5 Testbed Description 652
6 Simulation Results 652
7 Conclusions 654
References 655
62Variable Neighborhood Search Algorithms for the Node Placement Problem in Multihop Networks 656
Abstract 656
1 Introduction 657
2 Node Placement Problem (NPP) 657
3 Variable Neighborhood Search for NPP 658
3.1 VNSs for NPP 659
3.2 Variable k-swap Local Search Algorithm 660
4 Experimental Results 662
5 Conclusion 663
References 663
63Performance Evaluation of VANETs in Different Real Map Scenarios 664
Abstract 664
1 Introduction 664
2 Routing Protocols 665
2.1 Optimized Link-State Routing (OLSR) Protocol 665
2.2 Ad-hoc On-Demand Distance Vector (AODV) Routing Protocol 666
2.3 Dynamic Source Distance Vector 666
3 Simulation System Design and Implementation 667
3.1 Simulation Environment 667
3.2 Simulation Settings 668
4 Simulation Results 669
5 Conclusion and FutureWorks 671
References 672
64Error Performance of Successive Interference Cancellation Schemes in MIMO Systems 673
Abstract. 673
1 Introduction 673
2 System Model 674
3 Successive IC Operations 675
4 Numerical Simulation Results 676
5 Conclusions 679
References 679
65A Study on the Classification of Common Vulnerabilities and Exposures using Naïve Bayes 680
Abstract. 680
Keywords: 680
1 Introduction 680
2 Related Work 681
3 Methodology 682
3.1 Preprocessing of the overview text 682
3.2 Generating a vulnerability classification model 683
4 Results 683
4.1 Experimental data 683
4.2 Experimental results 684
5 Conclusion 685
Acknowledgments. 685
References 685
66A Study on The behavior-based Malware Detection Signature 686
Abstract. 686
Keywords: 686
1 Introduction 686
2 Related Work 687
2.1 Static analysis technology 687
2.2 Dynamic analysis technology 688
3 Analysis of malicious behavior based on data 688
3.1 Analysis of the characteristics of malicious behaviors based on researchand investigation 688
3.2 Analysis of the characteristics of malicious behaviors based on maliciousapp analysis data 690
4 Result 691
5 Conclusion 693
Acknowledgments. 693
References 693
Part IV The 7-th International Workshop on Methods, Analysis and Protocols for Wireless Communication(MAPWC-2016) 694
67 Design and Implementation of a Simulation System Based on Genetic Algorithm for Node Placement in Wireless Sensor and ActorNetworks 695
Abstract 695
1 Introduction 695
2 WSAN 696
2.1 WSAN Architectures 696
2.2 WSAN Challenges 697
2.3 Node Placement Problems and Their Applicability to WSANs 698
3 Overview of GA 699
4 Design and Implementation of Actor Node PlacementSimulation System 700
5 Visualization Interface 701
6 Conclusions 702
References 702
68VegeShop Tool: A Tool for Vegetable Recognition Using DNN 705
Abstract 705
Key words: 705
1 Introduction 705
2 Neural Networks 706
2.1 Deep Neural Network (DNN) 707
2.2 Convolutional Neural Network (CNN) 707
3 Object tracking system design 707
4 Evaluation Results 708
5 Conclusions 710
References 710
69A Fuzzy-BasedWireless Sensor and Actuator Network: Simulation and Experimental Results 714
Abstract 714
Key words: 714
1 Introduction 715
2 Wireless Sensor and Actuator Network 715
3 FBWSAN Testbed design 716
3.1 Overview 716
3.2 Scenario Settings 717
3.3 Fuzzy System 717
4 Evaluation Results 719
5 Conclusions 721
References 721
70Numerical analysis of resonance characteristics in cavities in periodic structure for WDM telecommunication system 723
Abstract 723
1 Introduction 723
2 Numerical analysis by CIP method 725
3 Two-Dimensional, Pillar-type Photonic Crystal structure, Line-defect Waveguide and Cavities 725
4 FFT analysis of outputs electric field in Cavity 727
5 Conclusions 730
Acknowledgment 730
References 730
71Spectrum analysis of envelope pulse after propagating in nonlinear dielectric material 731
Abstract 731
1 Introduction 731
2 Formulation of the problem 732
2.1 Governing equations for electromagnetic wave propagation innonlinear dielectric medium 732
2.2 Linear Dispersive Polarization PL 733
2.3 Raman Scattering PR 733
2.4 Kerr Effect PK 734
2.5 Evaluation of time derivative for PL and PNL 734
3 Formulation for CIP method for dispersive and nonlinearterms 734
4 Numerical examples 735
5 Concluding Remarks 737
Acknowledgment 737
References 738
Part V The 7-th International Workshop on Cloud, Wireless and e-CommerceSecurity (CWECS-2016) 739
72Device Parameter based Secure User Authentication 740
Abstract. 740
1 Introduction 740
2 Related Studies 741
3 System Architecture and Device’s Parameter Key 742
3.1 System Architecture 742
3.2 Initial Phase 742
3.3 Device’s Parameter Key (DPK) Generation Procedure 743
4 User Registration and Authentication Procedures 743
4.1 User Registration Procedure 744
4.2 User Authentication Procedure 745
5 Security Analysis 747
6 Conclusions and Future Studies 748
References 749
73Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality 750
Abstract. 750
1 Introduction 750
2 Big Data Characteristics and Challenges 751
2.1 Four characteristics of big data 751
2.2 Challenges of big data applications 752
3. Importance of Big Data Preprocessing 753
4. Quality measurement model and management procedure 754
4.1 Preprocessing task quality measurement model 754
4.2 Data preprocessing quality management procedure 755
5. Evaluation of PDQM procedure 756
6. Conclusion 757
Acknowledgments. 757
References 757
74Inferring Smartphone User Demographics from Wi-Fi trace Logs: a Study of Users’ Privacy Concerns 758
Abstract. 758
Keywords: 758
1 Introduction 758
2 Related Work 760
3 The Proposed Scheme 761
3.1 Trace Attack Model 761
3.2 SSID Informativeness Assessment 762
3.3 SSID Information Enrichment 762
3.4 The Overview of Proposed Scheme 763
4 Evaluation 763
4.1 Experiment Setting 763
4.2 Experiment Results 764
5 Conclusion 765
Acknowledgment 765
References 765
75 Enhancing Security of LTE using a Double MaskingTechnique 766
Abstract. 766
1 Introduction 766
2 Related Studies 767
3 Proposed Authentication Protocol 768
3.1 Attach Request Stage 769
3.2 Authentication Request Stage 770
3.3 Authentication Response Stage 770
4 Security Analysis 770
5 Conclusions and Future Studies 772
References 773
Part VI The 5-th International Workshop on RobotInteraction, Control, Communication and Cooperation (RI3C-2016) 774
76The effective flock control by two sheepdogs 775
Abstract 775
1 Introduction 775
2 Description of the sheepdog model 776
3 Results 778
4 Conlusion 780
Acknowledgements 780
References 780
77Design and Control of an Omnidirectional Wheelchair for Moving in Room Narrow Spaces 781
Abstract 781
1 Introduction 781
2 RelatedWork 782
3 Proposed OmnidirectionalWheelchair System 783
3.1 Kinematics 784
3.2 Control System of the Proposed Omnidirectional Wheelchair 786
4 Implementation and Application Issues 789
5 Conclusions and FutureWork 791
References 791
78Development of Training System for Pedaling Skill by Visualizing Muscle Activity Pattern 793
Abstract. 793
1 Introduction 793
2 Experimental device 794
3 Pedaling skill visualization 795
3.1 Signal processing of electromyogram 795
3.2 Strategy of visualizing pedaling skill 796
4 Experimental result 797
5 Discussion 799
Acknowledgments. 799
References 800
79Proposal for a strategy to discover the students with need for a learning support by using text analysis 801
Abstract. 801
1 Introduction 801
2 Methods 802
2.1 Objective 802
2.2 Definition of keywords 803
2.3 Materials for interview 803
2.4 Data acquisition 803
2.5 Text analysis 804
2.6 Psychological trends 804
2.7 Information Sharing 805
3. Discussions and future work 805
References 806
Part VII The 3-rd International Workshopon Secure Cloud Computing (SCC-2016) 807
80Construction of Boolean Functions With Optimal Algebraic Immunity 808
Abstract 808
1 Introduction 808
2 Preliminaries 809
3 Construction of Boolean functions 810
3.1 Construction of Boolean functions on odd variables 810
3.2 Analysis of Boolean function f 813
4 Conclusion 815
Acknowledgements 815
References 815
81Location-Sensitive Data Sharing in Mobile Cloud Computing 816
Abstract 816
1 Introduction 817
2 Deterministic Location Using Single Verifier 817
2.1 One Round Location 818
2.2 Two Rounds Location 819
3 SLDS: Secure Location-Sensitive Data Sharing Scheme 819
3.1 Scheme Framework 820
3.1.1 Initialization Stage 820
3.1.2 Configuration Stage 820
3.1.3 Data Access Stage 821
3.1.4 Decryption Stage 822
4 Conclusion 822
Acknowledgements 822
References 822
82Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing 823
Abstract 823
1 Introduction 824
1.1 Our Contributions 824
1.2 Related Work 824
2 Preliminaries 825
2.1 Cryptographic Background 825
2.2 Access Structures and Linear Secret Sharing Schemes 826
3 Definition and Security Model 826
3.1 Definition of Anonymous CP-ABE with Offline Computation 826
3.2 Security Model 827
4 Anonymous CP-ABE Scheme Supporting Offline KeyGeneration and Offline Encryption 827
4.1 Our Construction 827
4.2 Security Analysis 829
4.3 Performance Analysis 829
5 Conclusion 829
Acknowledgements 829
References 829
83Flexible Attribute-Based Keyword Search Via Two Access Policies 831
Abstract 831
1 Introduction 831
2 Our Construction 833
3 Security Analysis 836
4 Discussion 836
4.1 Functionality and Features Analysis 836
4.2 Efficiency Analysis 837
5 Conclusions 838
Acknowledgements 838
References 838
84Large Universe Revocable Fine-Grained Encryption with Public Auditing 839
Abstract 839
Key words: 839
1 Introduction 840
2 Problem Formulation 841
2.1 Definition of LRA-FE 841
2.2 System model 842
3 Our Construction 843
4 Discussion 845
5 Conclusions 846
6 Acknowledgements 846
References 846
85A privacy-preserving personal health record with searchability and revocability using attribute-based encryption 847
Abstract 847
1 Introduction 847
2 The security requirements 848
3 Our Construction 849
4 Security Requirements 852
5 Efficiency 853
6 Conclusion 854
7 Acknowledgments 854
References 854
86 Security Analysis and Improvement of ACollusion-Resistant Identity-Based Proxy Re-Encryption Scheme 855
Abstract 855
1 Introduction 856
2 Preliminaries 856
2.1 Bilinear groups 857
2.2 Identity-Based Proxy Re-encryption 857
2.3 Decisional Bilinear Diffie-Hellman Assumption 857
3 Analysis of Collusion Attack of Qiu et al.’s Scheme 858
4 The Improved Identity-Based Proxy Re-encryption SchemeAlgorithms 859
5 Security 860
5.1 Analysis of Collusion Attack of The Improved Scheme 860
5.2 The Security Proof of The Improved Scheme 861
5.3 Comparison 861
6 Conclusion 862
Acknowledgments 862
References 862
Part VIII The 3-rd International Workshop on Large Scale Networksand Applications (LSNA-2016) 863
87A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption 864
Abstract. 864
1 Introduction 864
2 Security Model 865
3 Robust Authenticated Encryption 867
4 The Proposed Protocol 868
5 Conclusions 869
Acknowledgments. 869
References 870
88 Three elliptic curve cryptography-based RFIDauthentication protocols for Internet of Things 871
Abstract: 871
Key words: 871
1. Introduction 871
2. Review of Lv et al.’s protocols 873
2.1. Lv et al.’s EC-RAC 1 protocol 874
2.2. Lv et al.’s EC-RAC 2 protocol 875
2.3. Lv et al.’s EC-RAC 3 protocol 876
3. Security analysis of Lv et al.’s protocols 877
3.1. Security analysis of Lv et al.’s EC-RAC 1 protocol 877
3.2. Security analysis of Lv et al.’s EC-RAC 2 protocol 879
3.3. Security analysis of Lv et al.’s EC-RAC 3 protocol 881
4. The proposed protocols 883
4.1. Our EC-RAC 1 protocol 883
4.2. Our EC-RAC 2 protocol 884
4.3. Our EC-RAC 3 protocol 886
5. Security analysis 887
6. Performance analysis 889
7. Conclusions 890
Acknowledges 891
References 891
89 On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems 893
Abstract. 893
1 Introduction 893
2 Adversarial Model 894
3 Review of Lu et al.’s Scheme 895
3.1 Registration Phase 895
3.2 Login and Authentication Phase 895
4 Cryptanalysis of Lu et al.’s Scheme 896
4.1 Identity Revelation Attack 896
4.2 Tracking Attack 896
4.3 Offline Password Guessing Attack 896
4.4 User Impersonation Attack 897
4.5 Server Impersonation Attack 897
5 Conclusions 898
Acknowledgments. 898
References 898
90 Oblivious Transfer Protocols Based on Group Factoring Problem 899
Abstract. 899
Keywords: 899
1 Introduction 899
2 Preliminaries 900
2.1 Background of group rings 900
2.2 Intractability Assumptions 901
3 Warming up 901
3.1 1-out-of-n OT protocol using matrices over group ring Zq[Sm] 901
3.2 Security analysis 902
3.3 A Simpler Construction 903
4 Efficient k-out-of-n OT protocol 903
4.1 Protocol Description 903
4.2 Efficiency analysis 904
5 Conclusions 905
References 906
91 E-Voting Scheme Using Secret Sharing and K-Anonymity 907
Abstract 907
1 Introduction 907
2 Preliminaries 908
2.1 Shamir’s (k,n) secret sharing scheme 908
2.2 Secret sharing homomorphism 908
2.3 k-anonymity 909
3 The system model 909
4 An electronic voting protocol 910
5 Security Analysis 912
6 Conclusion 913
Acknowledgements 913
7 References 913
Author Index 915

Erscheint lt. Verlag 21.10.2016
Reihe/Serie Lecture Notes on Data Engineering and Communications Technologies
Lecture Notes on Data Engineering and Communications Technologies
Zusatzinfo LVII, 903 p. 375 illus.
Verlagsort Cham
Sprache englisch
Themenwelt Technik Elektrotechnik / Energietechnik
Schlagworte Broadband Networking • Broad-Band Wireless Computing • Communications Technologies • data engineering • Mobile Networking • wireless communications
ISBN-10 3-319-49106-7 / 3319491067
ISBN-13 978-3-319-49106-6 / 9783319491066
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 36,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Ressourcen und Bereitstellung

von Martin Kaltschmitt; Karl Stampfer

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
66,99
Lehrbuch zu Grundlagen, Technologie und Praxis

von Konrad Mertens

eBook Download (2022)
Carl Hanser Verlag GmbH & Co. KG
34,99