0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Tools for Design, Implementation and Verification of Emerging Information Technologies - 15th EAI International Conference,... Tools for Design, Implementation and Verification of Emerging Information Technologies - 15th EAI International Conference, TridentCom 2020, Virtual Event, November 13, 2020, Proceedings (Paperback, 1st ed. 2021)
Yu Weng, Yuyu Yin, Li Kuang, Zijian Zhang
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TridentCom 2020. Due to COVID 19 pandemic the conference was held virtually. The 12 full papers were selected from 32 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on computer network and testbed application as well as analytics for big data of images and test.

Secure and Privacy-Preserving Data Communication in Internet of Things (Paperback, 1st ed. 2017): Liehuang Zhu, Zijian Zhang,... Secure and Privacy-Preserving Data Communication in Internet of Things (Paperback, 1st ed. 2017)
Liehuang Zhu, Zijian Zhang, Chang Xu
R1,901 Discovery Miles 19 010 Ships in 10 - 15 working days

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Datadart Nylon Stems-Small
R19 Discovery Miles 190
Gotcha Anadigi 50M-WR Watch (Gents)
R399 R236 Discovery Miles 2 360
Guilty And Proud - An MK Soldier's…
Marion Sparg Paperback R330 R240 Discovery Miles 2 400
Dare To Believe - Why I Could Not Stay…
Mmusi Maimane Paperback R350 R249 Discovery Miles 2 490
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Maxjoy Chest Expander
R280 R161 Discovery Miles 1 610
Tommee Tippee Closer To Nature Bottle…
R319 Discovery Miles 3 190
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger Blu-ray disc  (1)
R79 Discovery Miles 790
Bettaway Mega C1000 Fizzi Effervescent…
R62 Discovery Miles 620
Luca Distressed Peak Cap (Khaki)
R249 Discovery Miles 2 490

 

Partners