0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (16)
  • R500+ (4,482)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Resource Management for Multimedia Services in High Data Rate Wireless Networks (Paperback, 1st ed. 2017): Ruonan Zhang, Lin... Resource Management for Multimedia Services in High Data Rate Wireless Networks (Paperback, 1st ed. 2017)
Ruonan Zhang, Lin Cai, Jianping Pan
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

Wireless Health (Paperback, 1st ed. 2016): Hong-Gang Wang, Md. Shaad Mahmud, Hua Fang, Chonggang Wang Wireless Health (Paperback, 1st ed. 2016)
Hong-Gang Wang, Md. Shaad Mahmud, Hua Fang, Chonggang Wang
R1,529 Discovery Miles 15 290 Ships in 18 - 22 working days

This book provides a candid assessment and practical knowledge about the current technological advancements of the wireless healthcare system. This book presents the competencies of modeling e-health framework, medical wireless body sensor networks, communication technologies for mobile health, nanotechnology innovations in medicine, security issues for medical records, personalized services in healthcare applications, and Big Data for wireless health. This book covers multiple research perspectives in order to address the strong need for interdisciplinary research in the area of wireless health, such as the interactive research among biomedical sensor technology, intelligent textiles and advanced wireless network technology. The interactions involve experts from multidisciplinary fields including medical, information technology and computing fields. Designed as a study tool for graduate students, researchers, and medical professionals, this book is also valuable for business managers, entrepreneurs, and investors within the medical and healthcare industries. It is useful for anyone who cares about the future opportunities in healthcare systems.

Radio Resource Management for Mobile Traffic Offloading in Heterogeneous Cellular Networks (Paperback, 1st ed. 2017): Yuanwu,... Radio Resource Management for Mobile Traffic Offloading in Heterogeneous Cellular Networks (Paperback, 1st ed. 2017)
Yuanwu, Liping Qian, Jianwei Huang, Xuemin (Sherman) Shen
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users' data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooperation. This brief is an excellent resource for postgraduate students studying advanced-level topics in wireless communications and networking. Researchers, engineers and professionals working in related fields will also find this brief a valuable resource tool.

Intelligent Systems Technologies and Applications - Volume 2 (Paperback, 1st ed. 2016): Stefano Berretti, Sabu M. Thampi, Soura... Intelligent Systems Technologies and Applications - Volume 2 (Paperback, 1st ed. 2016)
Stefano Berretti, Sabu M. Thampi, Soura Dasgupta
R3,885 Discovery Miles 38 850 Ships in 18 - 22 working days

This book contains a selection of refereed and revised papers from three special tracks: Ad-hoc and Wireless Sensor Networks, Intelligent Distributed Computing and, Business Intelligence and Big Data Analytics originally presented at the International Symposium on Intelligent Systems Technologies and Applications (ISTA), August 10-13, 2015, Kochi, India.

Content-Centric Networks - An Overview, Applications and Research Challenges (Paperback, 1st ed. 2016): Syed Hassan Ahmed,... Content-Centric Networks - An Overview, Applications and Research Challenges (Paperback, 1st ed. 2016)
Syed Hassan Ahmed, Safdar Hussain Bouk, Dongkyun Kim
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This book introduces Content-Centric Networking (CCN), a networking paradigm that provides a simple and effective solution to the challenging demands of future wired and wireless communications. It provides an overview of the recent developments in the area of future internet technologies, bringing together the advancements that have been made in Information-Centric Networking (ICN) in general, with a focus on CCN. It begins with an introduction to the basics of CCN is followed by an overview of the current internet paradigm and its challenges. Next, an application perspective has been included, where the authors encompass the selected applications for CCN with recent refereed research and developments. These applications include Internet of Things (IoT), Smart Grid, Vehicular Ad hoc Networks (VANETs), and Wireless Sensor Networks (WSNs). The book is a useful reference source for practising researchers, and can be used as supporting material for undergraduate and graduate level courses in computer science and electrical engineering.

Smart Trends in Information Technology and Computer Communications - First International Conference, SmartCom 2016, Jaipur,... Smart Trends in Information Technology and Computer Communications - First International Conference, SmartCom 2016, Jaipur, India, August 6-7, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Aynur Unal, Malaya Nayak, Durgesh Kumar Mishra, Dharm Singh, Amit Joshi
R2,829 Discovery Miles 28 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Smart Trends in Information Technology and Computer Communications, SmartCom 2016, held in Jaipur, India, in August 2016. The 106 revised papers presented were carefully reviewed and selected from 469 submissions. The papers address issues on smart and secure systems; technologies for digital world; data centric approaches; applications for e-agriculture and e-health; products and IT innovations; research for knowledge computing.

Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015.... Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings (Paperback, 1st ed. 2015)
Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martinez
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

Cyber-Physical Attack Recovery Procedures - A Step-by-Step Preparation and Response Guide (Paperback, 1st ed.): Luis Ayala Cyber-Physical Attack Recovery Procedures - A Step-by-Step Preparation and Response Guide (Paperback, 1st ed.)
Luis Ayala
R2,298 Discovery Miles 22 980 Ships in 18 - 22 working days

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time-even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker-until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know-it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. What you'll learn Possible ways hackers can cause building equipment to fail. How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack. How to restore equipment operation without doing any more damage. Who This Book Is For Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

Cooperative Vehicular Communications in the Drive-thru Internet (Paperback, 1st ed. 2015): Haibo Zhou, Lin Gui, Quan Yu, Xuemin... Cooperative Vehicular Communications in the Drive-thru Internet (Paperback, 1st ed. 2015)
Haibo Zhou, Lin Gui, Quan Yu, Xuemin (Sherman) Shen
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

This brief presents a unified analytical framework for the evaluation of drive-thru Internet performance and accordingly proposes an optimal spatial access control management approach. A comprehensive overview and in-depth discussion of the research literature is included. It summarizes the main concepts and methods, and highlights future research directions. The brief also introduces a novel cooperative vehicular communication framework together with a delicate linear cluster formation scheme and low-delay content forwarding approach to provide a flexible and efficient vehicular content distribution in the drive-thru Internet. The presented medium access control and vehicular content distribution related research results in this brief provide useful insights for the design approach of Wi-Fi enabled vehicular communications and it motivates a new line of thinking for the performance enhancements of future vehicular networking. Advanced-level students, researchers and professionals interested in vehicular networks or coordinated network sharing will find Cooperative Vehicular Communications in the Drive-thru Internet a valuable reference.

Game Theory for Networks - 6th International Conference, GameNets 2016, Kelowna, BC, Canada, May 11-12, 2016, Revised Selected... Game Theory for Networks - 6th International Conference, GameNets 2016, Kelowna, BC, Canada, May 11-12, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Julian Cheng, Ekram Hossain, Haijun Zhang, Walid Saad, Mainak Chatterjee
R1,896 Discovery Miles 18 960 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Game Theory for Networks, GameNets 2016, held in Kelowna, Canada, in May 2016. The 13 papers were carefully selected from 26 submissions and cover topics such as algorithmic game theory, game models and theories, game theories in wireless networks, design and analysis of economic games.

Cooperative Cognitive Radio Networking - System Model, Enabling Techniques, and Performance (Paperback, 1st ed. 2016): Bin Cao,... Cooperative Cognitive Radio Networking - System Model, Enabling Techniques, and Performance (Paperback, 1st ed. 2016)
Bin Cao, Qinyu Zhang, Jon W. Mark
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This SpringerBrief examines the active cooperation between users of Cooperative Cognitive Radio Networking (CCRN), exploring the system model, enabling techniques, and performance. The brief provides a systematic study on active cooperation between primary users and secondary users, i.e., (CCRN), followed by the discussions on research issues and challenges in designing spectrum-energy efficient CCRN. As an effort to shed light on the design of spectrum-energy efficient CCRN, they model the CCRN based on orthogonal modulation and orthogonally dual-polarized antenna (ODPA). The resource allocation issues are detailed with respect to both models, in terms of problem formulation, solution approach, and numerical results. Finally, the optimal communication strategies for both primary and secondary users to achieve spectrum-energy efficient CCRN are analyzed.

Innovations for Community Services - 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised... Innovations for Community Services - 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Gunter Fahrnberger, Gerald Eichler, Christian Erfurth
R2,005 Discovery Miles 20 050 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th International Conference on Innovations for Community Services, I4CS 2016, held in Vienna, Austria, in June 2016. The 12 revised full papers presented together with two short papers were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on navigation and data management; monitoring and decision making; coding and security; collaboration and workflow; routing and technology; topic and object tracking.

Managing and Mining Sensor Data (Paperback, 2013 ed.): Charu C. Aggarwal Managing and Mining Sensor Data (Paperback, 2013 ed.)
Charu C. Aggarwal
R2,773 Discovery Miles 27 730 Ships in 18 - 22 working days

Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets. The human-centric aspect of sensor data has created tremendous opportunities in integrating social aspects of sensor data collection into the mining process. Managing and Mining Sensor Data is a contributed volume by prominent leaders in this field, targeting advanced-level students in computer science as a secondary text book or reference. Practitioners and researchers working in this field will also find this book useful.

Routing in Opportunistic Networks (Paperback, 2013 ed.): Isaac Woungang, Sanjay Kumar Dhurandher, Alagan Anpalagan, Athanasios... Routing in Opportunistic Networks (Paperback, 2013 ed.)
Isaac Woungang, Sanjay Kumar Dhurandher, Alagan Anpalagan, Athanasios V Vasilakos
R5,106 Discovery Miles 51 060 Ships in 18 - 22 working days

Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.

Next-Generation Wireless Technologies - 4G and Beyond (Paperback, 2013 ed.): Naveen Chilamkurti, Sherali Zeadally, Hakima... Next-Generation Wireless Technologies - 4G and Beyond (Paperback, 2013 ed.)
Naveen Chilamkurti, Sherali Zeadally, Hakima Chaouchi
R3,388 Discovery Miles 33 880 Ships in 18 - 22 working days

This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet of Things' from both a communications and a service perspective; discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks.

Industrial IoT Technologies and Applications - International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26,... Industrial IoT Technologies and Applications - International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Jiafu Wan, Iztok Humar, Daqiang Zhang
R2,111 Discovery Miles 21 110 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Industrial IoT Technologies and Applications, IoT 2016, held in GuangZhou, China, in March 2016. The volume contains 26 papers carefully reviewed and selected from 55 submissions focusing on topics such as big data, cloud computing, Internet of Things (IoT).

Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19,... Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings (Paperback, 1st ed. 2016)
Benedikt Gierlichs, Axel Y. Poschmann
R3,116 Discovery Miles 31 160 Ships in 18 - 22 working days

This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.

Web-Scale Data Management for the Cloud (Paperback, 2013 ed.): Wolfgang Lehner, Kai-Uwe Sattler Web-Scale Data Management for the Cloud (Paperback, 2013 ed.)
Wolfgang Lehner, Kai-Uwe Sattler
R3,370 Discovery Miles 33 700 Ships in 18 - 22 working days

The efficient management of a consistent and integrated database is a central task in modern IT and highly relevant for science and industry. Hardly any critical enterprise solution comes without any functionality for managing data in its different forms. Web-Scale Data Management for the Cloud addresses fundamental challenges posed by the need and desire to provide database functionality in the context of the Database as a Service (DBaaS) paradigm for database outsourcing. This book also discusses the motivation of the new paradigm of cloud computing, and its impact to data outsourcing and service-oriented computing in data-intensive applications. Techniques with respect to the support in the current cloud environments, major challenges, and future trends are covered in the last section of this book. A survey addressing the techniques and special requirements for building database services are provided in this book as well.

Massive MIMO Meets Small Cell - Backhaul and Cooperation (Paperback, 1st ed. 2017): Howard H. Yang, Tony Q. S. Quek Massive MIMO Meets Small Cell - Backhaul and Cooperation (Paperback, 1st ed. 2017)
Howard H. Yang, Tony Q. S. Quek
R1,550 Discovery Miles 15 500 Ships in 18 - 22 working days

This brief explores the utilization of large antenna arrays in massive multiple-input-multiple-output (MIMO) for both interference suppression, where it can improve cell-edge user rates, and for wireless backhaul in small cell networks, where macro base stations can forward data to small access points in an energy efficient way. Massive MIMO is deemed as a critical technology for next generation wireless technology. By deploying an antenna array that has active elements in excess of the number of users, massive MIMO not only provides tremendous diversity gain but also powers new aspects for network design to improve performance. This brief investigates a better utilization of the excessive spatial dimensions to improve network performance. It combines random matrix theory and stochastic geometry to develop an analytical framework that accounts for all the key features of a network, including number of antenna array, base station density, inter-cell interference, random base station deployment, and network traffic load. The authors explore the impact from different network parameters through numerical analysis.Researchers in wireless network design will find this to be an exceptional resource, as will advanced-level students or professionals working in networking and information systems design.

Web and Internet Economics - 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015,... Web and Internet Economics - 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015, Proceedings (Paperback, 1st ed. 2015)
Evangelos Markakis, Guido Schafer
R2,587 Discovery Miles 25 870 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Web and Internet Economics, WINE 2015, held in Amsterdam, The Netherlands, in December 2015. The 30 regular papers presented together with 8 abstracts were carefully reviewed and selected from 142 submissions and cover results on incentives and computation in theoretical computer science, artificial intelligence, and microeconomics.

Information Technologies and Mathematical Modelling: Queueing Theory and Applications - 15th International Scientific... Information Technologies and Mathematical Modelling: Queueing Theory and Applications - 15th International Scientific Conference, ITMM 2016, named after A.F. Terpugov, Katun, Russia, September 12-16, 2016. Proceedings (Paperback, 1st ed. 2016)
Alexander Dudin, Alexander Gortsev, Anatoly Nazarov, Rafael Yakupov
R2,449 Discovery Miles 24 490 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Scientific Conference on Information Technologies and Mathematical Modeling, named after A. F. Terpugov, ITMM 2016, held in Katun, Russia, in September 2016. The 33 full papers presented together with 4 short papers were carefully reviewed and selected from 96 submissions. They are devoted to new results in the queueing theory and its applications, addressing specialists in probability theory, random processes, mathematical modeling as well as engineers dealing with logical and technical design and operational management of telecommunication and computer networks.

Internetworking - Technological Foundations and Applications (Paperback, Softcover reprint of the original 1st ed. 2013):... Internetworking - Technological Foundations and Applications (Paperback, Softcover reprint of the original 1st ed. 2013)
Christoph Meinel, Harald Sack
R1,576 Discovery Miles 15 760 Ships in 18 - 22 working days

This book is supposed to serve as a comprehensive and instructive guide through the new world of digital communication. On the physical layer optical and electrical cabling technology are described as well as wireless communication technologies. On the data link layer local area networks (LANs) are introduced together with the most popular LAN technologies such as Ethernet, Token Ring, FDDI, and ATM as well as wireless LAN technologies including IEEE 802.x, Bluetooth, or ZigBee. A wide range of WAN technologies are covered including contemporary high speed technologies like PDH and SDH up to high speed wireless WANs (WiMAX) and 4th generation wireless telephone networks LTE. Routing technologies conclude the treatment of the data link layer. Next, there is the Internet layer with the Internet protocol IP that establishes a virtual uniform network out of the net of heterogeneous networks. In detail, both versions, IPv4 as well as the successor IPv6 are covered in detail as well as ICMP, NDP, and Mobile IP. In the subsequent transport layer protocol functions are provided to offer a connection-oriented and reliable transport service on the basis of the simple and unreliable IP. The basic protocols TCP and UDP are introduced as well as NAT, the network address translation. Beside transport layer security protocols like SSL and TLS are presented. On the upmost application layer popular Internet application protocols are described like DNS, SMTP, PGP, (S)FTP, NFS, SSH, DHCP, SNMP, RTP, RTCP, RTSP, and World Wide Web.

Wireless Sensor Networks - Principles, Design and Applications (Paperback, Softcover reprint of the original 1st ed. 2014):... Wireless Sensor Networks - Principles, Design and Applications (Paperback, Softcover reprint of the original 1st ed. 2014)
Shuang-Hua Yang
R4,789 Discovery Miles 47 890 Ships in 18 - 22 working days

Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: * sensor node design; * embedded software design; * routing algorithms; * sink node positioning; * co-existence with other wireless systems; * data fusion; * security; * indoor location tracking; * integrating with radio-frequency identification; and * Internet of things Wireless Sensor Networks brings together multiple strands of research in the design of WSNs, mainly from software engineering, electronic engineering, and wireless communication perspectives, into an over-arching examination of the subject, benefiting students, field engineers, system developers and IT professionals. The contents have been well used as the teaching material of a course taught at postgraduate level in several universities making it suitable as an advanced text book and a reference book for final-year undergraduate and postgraduate students.

Security-Aware Device-to-Device Communications Underlaying Cellular Networks (Paperback, 1st ed. 2016): Aiqing Zhang, Liang... Security-Aware Device-to-Device Communications Underlaying Cellular Networks (Paperback, 1st ed. 2016)
Aiqing Zhang, Liang Zhou, Lei Wang
R1,582 Discovery Miles 15 820 Ships in 18 - 22 working days

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user's throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book. This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency. This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006): John R Vacca Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006)
John R Vacca
R4,225 Discovery Miles 42 250 Ships in 18 - 22 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Smart Power Systems and Smart Grids…
Qiang Lu, Ying Chen, … Hardcover R3,403 Discovery Miles 34 030
Spectral Properties of Certain Operators…
Ilwoo Cho, Hemen Dutta Paperback R3,507 Discovery Miles 35 070
Basic mathematics for economics students…
Derek Yu Paperback R420 Discovery Miles 4 200
Multigrid
Ulrich Trottenberg, Cornelius W. Oosterlee, … Hardcover R2,249 Discovery Miles 22 490
Logic for Physicists
Nicolas A Pereyra Paperback R750 Discovery Miles 7 500
Boolean Systems - Topics in…
Serban Vlad Paperback R3,542 Discovery Miles 35 420
Dynamic Data Assimilation - Beating the…
Dinesh G. Harkut Hardcover R3,055 Discovery Miles 30 550
Unity Root Matrix Theory - Physics In…
Richard Miller Paperback R503 Discovery Miles 5 030
Particle Mechanics
Chris Collinson, Tom Roper Paperback R824 Discovery Miles 8 240
Six-Dimensional Superconformal Field…
Kantaro Ohmori Hardcover R2,653 Discovery Miles 26 530

 

Partners