Account
Orders
Advanced search
Following underwater acoustic channel modeling, this book investigates the relationship between coherence time and transmission distances. It considers the power allocation issues of two typical transmission scenarios, namely short-range transmission and medium-long...
This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms leverage traditional cryptographic primitives and anonymous protocols, and are redesigned to fit into the new framework...
This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data...
This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security...
This book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems. It presents MTD-based research efforts to protect cloud data centers, along with network and security risk-aware approaches...
This book introduces two basic big data processing paradigms for batch data and streaming data. Representative programming frameworks are also presented, as well as software defined networking (SDN) and network function virtualization (NFV) technologies as key cloud...
This book examines recent research on designing online charging and discharging strategies for mobile electric vehicles (EVs) in smart grid. First, the architecture and applications are provided. Then, the authors review the existing works on charging and discharging...
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers