This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP system…
This book provides thorough coverage of error correcting techniques. It includes essential basic concepts and the latest advances on key topics in design, implementation, and optimization of hardware/software systems for error correction. The book’s chapters are written by internationally recognized experts in this field. Topics include evolution of error correction techniques, industrial use…
This title provides a comprehensive, unified tutorial covering the most recent advances in the emerging technology of free-space optics (FSO), a field in which interest and attention continue to grow along with the number of new challenges. This book is intended as an all-inclusive source to serve the needs of those who require information about the fundamentals of FSO, as well as up-to-date ad…
This book constitutes the refereed proceedings of the 30th Euro Mini-Conference, EmC-ONS 2014, held in Aveiro, Portugal, in February 2014. The 13 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on dynamical systems; optimization and applications; modeling and statistical techniques for data analysis.
This book constitutes the proceedings of the First International Workshop on Language, Music and Computing, LMAC 2015, held in St. Petersburg, Russia, in April 2015. The 13 papers presented in this volume were carefully reviewed and selected from 38 submissions. They were organized in topical sections on music and language in education; corpus studies of language and music; problems of notatio…
This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health ca…
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance…
Digital media, including social media, has fundamentally changed how the human species communicates with, relates to, and influences one another. Adolescents use digital media extensively. Researchers, scholars, teachers, parents, and teens themselves have many questions about the effects of digital media on young people’s psychological development.
This book constitutes the thoroughly refereed post-workshop proceedings of the Second Workshop on Multimodal Analyses Enabling Artificial Agents in Human Interaction, MA3HMI 2014, held in Conjunction with INTERSPEECH 2014, in Singapore, Singapore, on September 14th, 2014. The 9 revised papers presented together with a keynote talk were carefully reviewed and selected from numerous submission…
This book introduces systematic design methods for passive and active RF circuits and techniques, including state-of-the-art digital enhancement techniques. As the very first book dedicated to multiband RF circuits and techniques, this work provides an overview of the evolution of transmitter architecture and discusses current digital predistortion techniques. Readers will find a collection of …