Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.
This authored monograph presents the state-of-the-art improvements in 2D materials, focusing on their most significant achievements, as well as recent emergence and potential applications. The book discusses synthetic protocols as well as the structural chemistry and physical properties of various 2D materials and explores their energy-related utilization. The main energy harvesting applications such as piezoelectric generators, solar cells and hydrogen evolution reactions are analyzed, while special focus is also given to the related energy storage technologies such as rechargeable batteries, supercapacitors and wearable energy storage devices. This volume sheds new light on 2D materials and their applications and will be a useful tool for graduates and academics working in the fields of materials science, materials physics and chemistry.
The book focuses on the research methods of networked control systems via sliding mode. The problems with network disturbances, network induced delay, out-of-sequence and packet loss, and network attacks are studied in detail. The content studied in this book is introduced in detail and is verified by simulation or experiment. It is especially suitable for readers who are interested in learning the control scheme of networked systems. This book can benefit researchers, engineers, and students in related fields such as electrical, control, automation, and cyber security.
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.
The book focuses on the research methods of networked control systems via sliding mode. The problems with network disturbances, network induced delay, out-of-sequence and packet loss, and network attacks are studied in detail. The content studied in this book is introduced in detail and is verified by simulation or experiment. It is especially suitable for readers who are interested in learning the control scheme of networked systems. This book can benefit researchers, engineers, and students in related fields such as electrical, control, automation, and cyber security.
|
You may like...
|