|
Showing 1 - 4 of
4 matches in All Departments
This book focuses on the design of secure and efficient signature
and signcryption schemes for vehicular ad-hoc networks (VANETs). We
use methods such as public key cryptography (PKI), identity-based
cryptography (IDC), and certificateless cryptography (CLC) to
design bilinear pairing and elliptic curve cryptography-based
signature and signcryption schemes and prove their security in the
random oracle model. The signature schemes ensure the authenticity
of source and integrity of a safety message. While signcryption
schemes ensure authentication and confidentiality of the safety
message in a single logical step. To provide readers to study the
schemes that securely and efficiently process a message and
multiple messages in vehicle to vehicle and vehicle to
infrastructure communications is the main benefit of this book. In
addition, it can benefit researchers, engineers, and graduate
students in the fields of security and privacy of VANETs, Internet
of vehicles securty, wireless body area networks security, etc.
In Approaches to Social Research: The Case of Deaf Studies, Alys
Young and Bogusia Temple explore the relationship between key
methodological debates in social research and the special context
of studies concerning d/Deaf people(s). The book is organized
around 7 topics: being d/Deaf as a site of contested identity and
representation; epistemology and the boundaries of claims for
population specific and plural epistemologies; ethics and the
implications of collective identity on standard ethical principles
and practices; populations and sampling given the highly
heterogeneous nature of d/Deaf people(s); narrative methodologies
re-examined in light of the visual nature of signed languages;
interpretation, translation and transcription and the context of
multiple modalities; and information and communication technologies
as transformative epistemologies. Through these themes, new aspects
of old debates within social research become evident, and the
authors challenge specialist field of studies by, with, and about
d/Deaf people. Throughout the volume, the authors also show how the
field provides challenges to established ways of thinking and
working. The book is of interest to scholars within and outside of
research concerning d/Deaf people(s), as well as practitioners in
the fields of deaf education, social work and allied health
professions.
This book focuses on the design of secure and efficient signature
and signcryption schemes for vehicular ad-hoc networks (VANETs). We
use methods such as public key cryptography (PKI), identity-based
cryptography (IDC), and certificateless cryptography (CLC) to
design bilinear pairing and elliptic curve cryptography-based
signature and signcryption schemes and prove their security in the
random oracle model. The signature schemes ensure the authenticity
of source and integrity of a safety message. While signcryption
schemes ensure authentication and confidentiality of the safety
message in a single logical step. To provide readers to study the
schemes that securely and efficiently process a message and
multiple messages in vehicle to vehicle and vehicle to
infrastructure communications is the main benefit of this book. In
addition, it can benefit researchers, engineers, and graduate
students in the fields of security and privacy of VANETs, Internet
of vehicles securty, wireless body area networks security, etc.
|
Current Approaches in Applied Artificial Intelligence - 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2015, Seoul, South Korea, June 10-12, 2015, Proceedings (Paperback, 2015 ed.)
Moonis Ali, Young Sig Kwon, Chang-Hwan Lee, Juntae Kim, Yongdai Kim
|
R1,650
Discovery Miles 16 500
|
Ships in 10 - 15 working days
|
This book constitutes the refereed conference proceedings of the
28th International Conference on Industrial, Engineering and Other
Applications of Applied Intelligent Systems, IEA/AIE 2015, held in
Seoul, South Korea, in June 2015. The 73 revised full papers
presented were carefully reviewed and selected from 105
submissions. The papers cover a wide range of topics in applied
artificial intelligence including reasoning, robotics, cognitive
modeling, machine learning, pattern recognition, optimization, text
mining, social network analysis, and evolutionary algorithms. They
are organized in the following topical sections: theoretical AI,
knowledge-based systems, optimization, Web and social networks,
machine learning, classification, unsupervised learning, vision,
image and text processing, and intelligent systems applications.
|
You may like...
Tenet
John David Washington, Robert Pattinson, …
DVD
(1)
R51
Discovery Miles 510
Ab Wheel
R209
R149
Discovery Miles 1 490
|