![]() |
![]() |
Your cart is empty |
||
Showing 1 - 6 of 6 matches in All Departments
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks. Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being monitored or even to destroy or compromise the whole network. This book will aid in the protection against this serious privacy threat.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Smart Grid Security, SmartGridSec 2014, held in Munich, Germany, in February 2014. The volume contains twelve corrected and extended papers presented at the workshop which have undergone two rounds of reviewing and improvement. The engineering, deployment and operation of the future Smart Grid will be an enormous project that will require the active participation of many stakeholders with different interests and views regarding the security and privacy goals, technologies, and solutions. There is an increasing need for workshops that bring together researchers from different communities, from academia and industry, to discuss open research topics in the area of future Smart Grid security.
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains three full-paper length invited papers and 7 corrected and extended papers from the First International Workshop on Smart Grid Security, SmartGridSec 2012, which brought together researchers from different communities from academia and industry in the area of securing the Future Smart Grid and was held in Berlin, Germany, on December 3, 2012.
This book constitutes the thoroughly refereed post-conference
proceedings of the 6th International Workshop on Security and Trust
Management, STM 2010, held in Athens, Greece, in September 2010.
This volume contains the proceedings of Formal Methods 2008, the 15th Inter- ? nationalSymposiumonFormalMethods, organizedbyAbo AkademiUniversity, Turku, Finland, during May 26-30, 2008. The series of Formal Methods conf- ences is supported by FME (Formal Methods Europe), an independent asso- ation which aims to stimulate the use of, and the research on, formal methods for system development. The ?rst event in this series was VDM Europe, held in 1987. The scope of the symposium has grown since then, encompassing all aspects of software and hardware that are amenable to formal analysis. As inpreviousyears, this symposiumbroughttogetherinnovatorsandprac- tionersinprecisemathematicalmethodsforsoftwaredevelopment, academicand industrial users as well as researchers, tool developers and vendors. We received 106 submissions from 24 countries, a demonstration of the international nature of the event. Each submission was carefully refereed by at least three reviewers. The Programme Committee ?nally selected 23 papers for presentation at the symposium after what was sometimes really extensive discussion We would like to extend our thanks once more to all the members of the Programme Comm- tee and to all the reviewers for their excellent and e?cient work. (The names of all involved appear over the page.) Apart from the regular papers, there were ?ve invited talks at the symposium, given by Arvind, Shmuel Katz, Paolo Br- ciani, Jay Misra, and Dawson Engler. Arvind and Katz also submitted papers to accompany their talks and these are included in the volume. The Formal Methods 2008 symposium also included various related even
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks. Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being monitored or even to destroy or compromise the whole network. This book will aid in the protection against this serious privacy threat.
|
![]() ![]() You may like...
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn
Paperback
![]()
|