Da: WeBuyBooks, Rossendale, LANCS, Regno Unito
EUR 32,18
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Like New. Most items will be dispatched the same or the next working day. An apparently unread copy in perfect condition. Dust cover is intact with no nicks or tears. Spine has no signs of creasing. Pages are clean and not marred by notes or folds of any kind.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 62,13
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Inglese
Editore: Springer International Publishing AG, CH, 2018
ISBN 10: 3319789414 ISBN 13: 9783319789415
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 64,48
Quantità: Più di 20 disponibili
Aggiungi al carrelloHardback. Condizione: New. 1st ed. 2018. This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 63,43
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 57,10
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 59,04
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Chiron Media, Wallingford, Regno Unito
EUR 56,28
Quantità: 10 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 59,03
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 66,53
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
EUR 75,15
Quantità: 15 disponibili
Aggiungi al carrelloCondizione: New.
Da: Revaluation Books, Exeter, Regno Unito
EUR 84,18
Quantità: 2 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 88 pages. 9.25x6.10x0.63 inches. In Stock.
Condizione: New.
Lingua: Inglese
Editore: Springer, Berlin, Springer, 2018
ISBN 10: 3319789414 ISBN 13: 9783319789415
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 57,68
Quantità: 2 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Provides a discussion of data (particularlyimage)authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks.
Da: Mispah books, Redhill, SURRE, Regno Unito
EUR 98,75
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: New. New. book.
EUR 26,97
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | Autonomous driving is an emerging field. Vehicles are equipped with different systems such as radar, lidar, GPS etc. that enable the vehicle to make decisions and navigate without user's input, but there are still concerns regarding safety and security. This book analyses the security needs and solutions which are beneficial to autonomous driving.
Lingua: Inglese
Editore: Springer International Publishing AG, CH, 2018
ISBN 10: 3319789414 ISBN 13: 9783319789415
Da: Rarewaves.com UK, London, Regno Unito
EUR 59,63
Quantità: Più di 20 disponibili
Aggiungi al carrelloHardback. Condizione: New. 1st ed. 2018. This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks.
Da: preigu, Osnabrück, Germania
EUR 78,10
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Robust nonlinear control system design for hypersonic flight vehicles | Obaid Ur Rehman | Taschenbuch | 264 S. | Englisch | 2014 | Scholars' Press | EAN 9783639714838 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
EUR 143,50
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 172,03
Quantità: Più di 20 disponibili
Aggiungi al carrelloHardback. Condizione: New. Autonomous driving is an emerging field. Vehicles are equipped with different systems such as radar, lidar, GPS etc. that enable the vehicle to make decisions and navigate without user's input, but there are still concerns regarding safety and security. This book analyses the security needs and solutions which are beneficial to autonomous driving.
EUR 174,08
Quantità: Più di 20 disponibili
Aggiungi al carrelloHardback. Condizione: New. Autonomous driving is an emerging field. Vehicles are equipped with different systems such as radar, lidar, GPS etc. that enable the vehicle to make decisions and navigate without user's input, but there are still concerns regarding safety and security. This book analyses the security needs and solutions which are beneficial to autonomous driving.
Lingua: Tedesco
Editore: Springer International Publishing AG, 2024
ISBN 10: 3031417518 ISBN 13: 9783031417511
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 111,95
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 100,66
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Lingua: Tedesco
Editore: Springer International Publishing AG, 2024
ISBN 10: 3031417518 ISBN 13: 9783031417511
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 115,58
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Tedesco
Editore: Springer International Publishing AG, 2024
ISBN 10: 3031417518 ISBN 13: 9783031417511
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 100,65
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Tedesco
Editore: Springer International Publishing AG, 2024
ISBN 10: 3031417518 ISBN 13: 9783031417511
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 115,20
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Revaluation Books, Exeter, Regno Unito
EUR 137,98
Quantità: 2 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 84 pages. German language. 9.25x6.10x9.21 inches. In Stock.
Lingua: Tedesco
Editore: Springer International Publishing, 2024
ISBN 10: 3031417518 ISBN 13: 9783031417511
Da: moluna, Greven, Germania
EUR 99,99
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New. Eroerterung von Methoden zur Authentifizierung von Daten in Gegenwart von Rauschen bei der drahtlosen KommunikationStellt eine neue Klasse von Soft-Authentifizierungsmethoden vor, um geringfuegige Aenderungen in Bilddaten zu tolerierenPraesenti.
Da: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 46,22
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: new. Questo è un articolo print on demand.
Da: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 46,22
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: new. Questo è un articolo print on demand.
Lingua: Inglese
Editore: Berlin Springer International Publishing Springer Apr 2018, 2018
ISBN 10: 3319789414 ISBN 13: 9783319789415
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 53,49
Quantità: 2 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book.Provides a discussion of data (particularlyimage)authentication methods in the presence of noise experienced in wireless communication;Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data;Features authentication methods based on the usage of authentication tags as well as digital watermarks. 73 pp. Englisch.