0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Störungstolerante Datenauthentifizierung für drahtlose Kommunikation: Obaid Ur-Rehman, Natasa Zivic Störungstolerante Datenauthentifizierung für drahtlose Kommunikation
Obaid Ur-Rehman, Natasa Zivic
R2,649 Discovery Miles 26 490 Ships in 10 - 15 working days

Dieses Buch gibt einen Einblick in die Herausforderungen der Datenauthentifizierung über drahtlose Kommunikationskanäle. Die Autoren gehen davon aus, dass die etablierten Standard-Authentifizierungsmechanismen nicht ausreichen, um Daten wie Sprache, Bilder und Videos über drahtlose Kanäle zu authentifizieren, da die drahtlose Kommunikation durch zahlreiche Störungen gekennzeichnet ist. Die Autoren schlagen neue Mechanismen vor, die auf so genannten Soft-Authentifizierungsalgorithmen basieren, die einige Änderungen an den zu schützenden Daten tolerieren. Die Autoren erklären, dass das Ziel dieser Algorithmen darin besteht, tolerant gegenüber inhaltlichen Änderungen auf Grund von Übertragungsfehler zu sein, aber dennoch in der Lage zu sein, Fälschungen zu erkennen. Ein weiterer Vorteil der Soft-Authentifizierungsalgorithmen besteht darin, dass sie in der Lage sind, die veränderten Stellen zu identifizieren und sie nach Möglichkeit zu korrigieren. Die Autoren zeigen, wie man dies erreicht, indem man die Datenmerkmale mit Hilfe von fehlerkorrigierenden Codes schützt. · Erörtert Methoden zur Authentifizierung von Daten (insbesondere von Bildern) bei Übertragungsstörungen, die bei der drahtlosen Kommunikation auftreten; · Stellt eine neue Klasse von Soft-Authentifizierungsmethoden vor, die anstelle der üblichen Hard-Authentifizierungsmethoden verwendet werden, um geringfügige Änderungen der Bilddaten zu tolerieren; · Verfügt über Authentifizierungsmethoden, die auf der Verwendung von Authentifizierungscodes und digitalen Wasserzeichen basieren

Noise Tolerant Data Authentication for Wireless Communication (Paperback, Softcover reprint of the original 1st ed. 2018):... Noise Tolerant Data Authentication for Wireless Communication (Paperback, Softcover reprint of the original 1st ed. 2018)
Obaid Ur-Rehman, Natasa Zivic
R1,684 Discovery Miles 16 840 Ships in 10 - 15 working days

This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication; Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data; Features authentication methods based on the usage of authentication tags as well as digital watermarks.

Noise Tolerant Data Authentication for Wireless Communication (Hardcover, 1st ed. 2018): Obaid Ur-Rehman, Natasa Zivic Noise Tolerant Data Authentication for Wireless Communication (Hardcover, 1st ed. 2018)
Obaid Ur-Rehman, Natasa Zivic
R1,653 Discovery Miles 16 530 Ships in 10 - 15 working days

This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication; Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data; Features authentication methods based on the usage of authentication tags as well as digital watermarks.

Security in Autonomous Driving (Hardcover): Obaid Ur-Rehman, Natasa Zivic Security in Autonomous Driving (Hardcover)
Obaid Ur-Rehman, Natasa Zivic
R4,362 Discovery Miles 43 620 Ships in 10 - 15 working days

Autonomous driving is an emerging field. Vehicles are equipped with different systems such as radar, lidar, GPS etc. that enable the vehicle to make decisions and navigate without user's input, but there are still concerns regarding safety and security. This book analyses the security needs and solutions which are beneficial to autonomous driving.

Robust nonlinear control system design for hypersonic flight vehicles (Paperback): Obaid Ur-Rehman Robust nonlinear control system design for hypersonic flight vehicles (Paperback)
Obaid Ur-Rehman
R2,463 Discovery Miles 24 630 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ruby Ripple Rug (160x230cm)
R1,499 R425 Discovery Miles 4 250
Tower Vinyl Sticker - Baby on the Move
R62 R47 Discovery Miles 470
Aqualine Back Float (Yellow and Blue)
R277 Discovery Miles 2 770
JCB Supreme Hi-Top Carbon Toe Safety…
R1,689 Discovery Miles 16 890
Baby Dove Rich Moisture Wipes (50Wipes)
R40 Discovery Miles 400
Rotatrim A4 Paper Ream (80gsm)(500…
R97 Discovery Miles 970
Luca Distressed Peak Cap (Khaki)
R249 Discovery Miles 2 490
Guilty And Proud - An MK Soldier's…
Marion Sparg Paperback R330 R240 Discovery Miles 2 400
Dare To Believe - Why I Could Not Stay…
Mmusi Maimane Paperback R350 R249 Discovery Miles 2 490
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners