0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Tools for Design, Implementation and Verification of Emerging Information Technologies - 15th EAI International Conference,... Tools for Design, Implementation and Verification of Emerging Information Technologies - 15th EAI International Conference, TridentCom 2020, Virtual Event, November 13, 2020, Proceedings (Paperback, 1st ed. 2021)
Yu Weng, Yuyu Yin, Li Kuang, Zijian Zhang
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TridentCom 2020. Due to COVID 19 pandemic the conference was held virtually. The 12 full papers were selected from 32 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on computer network and testbed application as well as analytics for big data of images and test.

Secure and Privacy-Preserving Data Communication in Internet of Things (Paperback, 1st ed. 2017): Liehuang Zhu, Zijian Zhang,... Secure and Privacy-Preserving Data Communication in Internet of Things (Paperback, 1st ed. 2017)
Liehuang Zhu, Zijian Zhang, Chang Xu
R1,789 Discovery Miles 17 890 Ships in 10 - 15 working days

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Nintendo Labo Customisation Set for…
R246 R114 Discovery Miles 1 140
On That Wave Of Gulls
Vernon R.L. Head Paperback R280 R99 Discovery Miles 990
Koh i-Noor Progresso Woodless…
R3,140 Discovery Miles 31 400
Cadac Pizza Stone (33cm)
 (18)
R398 Discovery Miles 3 980
Cable Guy Ikon "Light Up" PlayStation…
R599 R549 Discovery Miles 5 490
Fly Repellent ShooAway (White)
 (3)
R349 R299 Discovery Miles 2 990
Clit Licking Stimulation Sucking G Spot…
R999 R799 Discovery Miles 7 990
Fidget Toy Creation Lab
Kit R199 R156 Discovery Miles 1 560
700ml Grip Water Bottle
R20 Discovery Miles 200
White Glo Floss Charcoal Mint
R50 Discovery Miles 500

 

Partners