0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Wireless Algorithms, Systems, and Applications - 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016.... Wireless Algorithms, Systems, and Applications - 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings (Paperback, 1st ed. 2016)
Qing Yang, Wei Yu, Yacine Challal
R3,139 Discovery Miles 31 390 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2016, held in Bozeman, MT, USA, in August 2016.The 50 full papers and 9 invited papers presented werde carefully reviewed and selected from 148 submissions. WASA is designed to be a forum for theoreticians, system and application designers, protocol developers and practitioners to discuss and express their views on the current trends, challenges, and state-of-the-art solutions related to various issues in wireless networks. Topics of interests include, but not limited to, effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.

Adaptive Security in Dynamic Group Communications (Paperback): Yacine Challal Adaptive Security in Dynamic Group Communications (Paperback)
Yacine Challal
R1,677 Discovery Miles 16 770 Ships in 10 - 15 working days

Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications such as video conferencing, interactive group games, TV over Internet and broadcasting stock quotes. Nevertheless, the lack of security in the multicast paradigm obstructs the large scale deployment of such multi-party applications that have a large place in the information technology market. In this book we deal with the two keystone security issues of any secure multicast architecture: data origin authentication and confidentiality. For each service, we present a detailed analysis of the problem. Then, we present protocols and architectures that provide those security services and analyze their advantages and limitations. Finally, we discuss some new ideas and solutions dealing specifically with large scale and highly dynamic group communications. The analysis should help shed some light on security issues and solutions in multicast- based applications and services, and should be especially useful to professionals in group communication security, or anyone else who may be considering utilizing or deploying multicast-based communication solutions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Elecstor 18W In-Line UPS (Black)
R999 R404 Discovery Miles 4 040
Wild About You - A 60-Day Devotional For…
John Eldredge, Stasi Eldredge Hardcover R309 Discovery Miles 3 090
First Aid Dressing No 3
R5 R1 Discovery Miles 10
A Street Cat Named Bob
Luke Treadaway, Ruta Gedmintas, … DVD  (3)
R133 Discovery Miles 1 330
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Morbius
Jared Leto, Matt Smith, … DVD R172 Discovery Miles 1 720
Angelcare Nappy Bin Refills
R165 R145 Discovery Miles 1 450
Vital BabyŽ HYDRATE™ Incredibly Cool…
R189 Discovery Miles 1 890
Treeline Tennis Balls (Pack of 3)
R59 R49 Discovery Miles 490

 

Partners