|
Showing 1 - 4 of
4 matches in All Departments
Mobile crowdsensing is a technology that allows large scale,
cost-effective sensing of the physical world. In mobile
crowdsensing, mobile personal devices such as smart phones or smart
watches come equipped with a variety of sensors that can be
leveraged to collect data related to environment, transportation,
healthcare, safety and so on. This book presents the first
extensive coverage of mobile crowdsensing, with examples and
insights drawn from the authors' extensive research on this topic
as well as from the research and development of a growing community
of researchers and practitioners working in this emerging field.
Throughout the text, the authors provide the reader with various
examples of crowdsensing applications and the building blocks to
creating the necessary infrastructure, explore the related concepts
of mobile sensing and crowdsourcing, and examine security and
privacy issues introduced by mobile crowdsensing platforms.
Provides a comprehensive description of mobile crowdsensing, a
one-stop shop for all relevant issues pertaining to mobile
crowdsensing, including motivation, applications, design and
implementation, incentive mechanisms, and reliability and privacy.
Describes the design and implementations of mobile crowdsensing
platforms of great interest for the readers working in research and
industry to quickly implement and test their systems. Identifies
potential issues in building such mobile crowdsensing applications
to ensure their usability in real life and presents future
directions in mobile crowdsensing by emphasizing the open problems
that have to be addressed.
|
Financial Cryptography and Data Security - FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers (Paperback, Softcover reprint of the original 1st ed. 2010)
Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, …
|
R1,557
Discovery Miles 15 570
|
Ships in 10 - 15 working days
|
This volume contains the workshopproceedings of the accompanying
workshops of the 14th Financial Cryptograpy and Data Security
International Conference 2010, held on Tenerife, Canary Islands,
Spain, January 25-28, 2010. FinancialCryptographyandData Securityis
a majorinternationalforumfor research, advanced development,
education, exploration, and debate regarding information assurance,
with a speci?c focus on commercial contexts. The c- ference covers
all aspects of securing transactions and systems and especially
encourages original work focusing on both fundamental and applied
real-world deployments on all aspects surrounding commerce
security. Three workshops were co-located with FC 2010: the
Workshop on Real-Life
CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics
in Computer Security Research (WECSR), and the Workshop on
Lightweight Cryptography for Resource-Constrained Devices (WLC).
Intimate and colorful by tradition, the high-quality program was
not the only attraction of FC. In the past, FC conferences have
been held in highly research-synergistic locations such as Tobago,
Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman,
and Cozumel Mexico. 2010 was the ?rst year that the conference was
held on European soil, in the Spanish Canary Islands, in Atlantic
waters, a few miles across Morocco. Over 100 researchers from more
than 20 countries were in attendance.
|
Financial Cryptography and Data Security - FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers (Hardcover, Edition.)
Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, …
|
R1,578
Discovery Miles 15 780
|
Ships in 10 - 15 working days
|
This volume contains the workshopproceedings of the accompanying
workshops of the 14th Financial Cryptograpy and Data Security
International Conference 2010, held on Tenerife, Canary Islands,
Spain, January 25-28, 2010. FinancialCryptographyandData Securityis
a majorinternationalforumfor research, advanced development,
education, exploration, and debate regarding information assurance,
with a speci?c focus on commercial contexts. The c- ference covers
all aspects of securing transactions and systems and especially
encourages original work focusing on both fundamental and applied
real-world deployments on all aspects surrounding commerce
security. Three workshops were co-located with FC 2010: the
Workshop on Real-Life
CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics
in Computer Security Research (WECSR), and the Workshop on
Lightweight Cryptography for Resource-Constrained Devices (WLC).
Intimate and colorful by tradition, the high-quality program was
not the only attraction of FC. In the past, FC conferences have
been held in highly research-synergistic locations such as Tobago,
Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman,
and Cozumel Mexico. 2010 was the ?rst year that the conference was
held on European soil, in the Spanish Canary Islands, in Atlantic
waters, a few miles across Morocco. Over 100 researchers from more
than 20 countries were in attendance.
Cloud services have revolutionized computing in the modern world.
In an increasingly networked ecosystem, it is commonplace for
enterprises and private parties alike to leverage cloud services
for storage and compute. The most obvious benefits include
scalability, increased availability, and the potential for reduced
costs when compared to lower-scale on premise infrastructures. In
addition, cloud-hosted data (and compute) is accessible across
platforms and is not limited by geographical constraints making
collaboration attractively viable. However, the benefits of
outsourcing data and computation come with security and privacy
concerns. This monograph explores the advances in cloud security
research across both industry and academia, with a special focus on
secure infrastructure, services and storage. Besides overviewing
the state of the art, the monograph highlights open problems, and
possible future research directions. Cloud security is a broad
topic encompassing concepts from a large cross section of domains.
To make this monograph concise and meaningful, several topics and
challenges that are almost entirely specific to clouds are covered.
For this reason, general computing security topics such as
intrusion detection, software protection, phishing etc. are
excluded. While these are important building blocks that need to be
considered in an end-to-end cloud-centric design, they have been
extensively addressed elsewhere. The publication is divided into
three parts based on a broad clustering into hardware, computation,
and storage. The monograph should appeal to researchers, students
and professionals who work on Cloud Computing in general, and Cloud
Security specifically.
|
You may like...
Tenet
John David Washington, Robert Pattinson
Blu-ray disc
(1)
R54
Discovery Miles 540
|