0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Tools for Design, Implementation and Verification of Emerging Information Technologies - 15th EAI International Conference,... Tools for Design, Implementation and Verification of Emerging Information Technologies - 15th EAI International Conference, TridentCom 2020, Virtual Event, November 13, 2020, Proceedings (Paperback, 1st ed. 2021)
Yu Weng, Yuyu Yin, Li Kuang, Zijian Zhang
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TridentCom 2020. Due to COVID 19 pandemic the conference was held virtually. The 12 full papers were selected from 32 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on computer network and testbed application as well as analytics for big data of images and test.

Secure and Privacy-Preserving Data Communication in Internet of Things (Paperback, 1st ed. 2017): Liehuang Zhu, Zijian Zhang,... Secure and Privacy-Preserving Data Communication in Internet of Things (Paperback, 1st ed. 2017)
Liehuang Zhu, Zijian Zhang, Chang Xu
R1,845 Discovery Miles 18 450 Ships in 10 - 15 working days

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Puccini Orchcestral Arias
Tutti Camarata CD R537 Discovery Miles 5 370
The Story of the Country House - A…
Clive Aslet Paperback R507 R462 Discovery Miles 4 620
The British Essayists - Spectator
James Ferguson Paperback R639 Discovery Miles 6 390
This Is How It Is - True Stories From…
The Life Righting Collective Paperback R265 R245 Discovery Miles 2 450
100 Mandela Moments
Kate Sidley Paperback R260 R232 Discovery Miles 2 320
Doctor Who: The Unfolding Event…
Matt Hills Hardcover R1,858 Discovery Miles 18 580
Excursions in Biblical Chronology
Lee W. Casperson Hardcover R1,089 Discovery Miles 10 890
Light Through The Bars - Understanding…
Babychan Arackathara Paperback R30 R28 Discovery Miles 280
A History Of South Africa - From The…
Fransjohan Pretorius Paperback R765 Discovery Miles 7 650
Beeld 50 - Om 'n Groot Storie Hard Te…
Erika de Beer Paperback R395 R353 Discovery Miles 3 530

 

Partners