0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Tools for Design, Implementation and Verification of Emerging Information Technologies - 15th EAI International Conference,... Tools for Design, Implementation and Verification of Emerging Information Technologies - 15th EAI International Conference, TridentCom 2020, Virtual Event, November 13, 2020, Proceedings (Paperback, 1st ed. 2021)
Yu Weng, Yuyu Yin, Li Kuang, Zijian Zhang
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TridentCom 2020. Due to COVID 19 pandemic the conference was held virtually. The 12 full papers were selected from 32 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on computer network and testbed application as well as analytics for big data of images and test.

Secure and Privacy-Preserving Data Communication in Internet of Things (Paperback, 1st ed. 2017): Liehuang Zhu, Zijian Zhang,... Secure and Privacy-Preserving Data Communication in Internet of Things (Paperback, 1st ed. 2017)
Liehuang Zhu, Zijian Zhang, Chang Xu
R1,901 Discovery Miles 19 010 Ships in 10 - 15 working days

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Large 1680D Boys & Girls Backpack…
R509 Discovery Miles 5 090
Multi Colour Animal Print Neckerchief
R119 Discovery Miles 1 190
Docking Edition Multi-Functional…
 (1)
R899 R500 Discovery Miles 5 000
Elecstor 18W In-Line UPS (Black)
R999 R869 Discovery Miles 8 690
Closer To Love - How To Attract The…
Vex King Paperback R360 R309 Discovery Miles 3 090
Elecstor B22 7W Rechargeable LED Bulb…
R399 R369 Discovery Miles 3 690
The South African Guide To Gluten-Free…
Zorah Booley Samaai Paperback R380 R270 Discovery Miles 2 700
Bibby's - More Good Food
Dianne Bibby Hardcover R480 R340 Discovery Miles 3 400
Pink Fresh Couture by Moschino EDT 100ml…
R1,458 Discovery Miles 14 580
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840

 

Partners