Secure and Privacy-Preserving Data Communication in Internet of Things: SpringerBriefs in Electrical and Computer Engineering
Autor Liehuang Zhu, Zijian Zhang, Chang Xuen Limba Engleză Paperback – mar 2017
This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT afterreading this book.
Din seria SpringerBriefs in Electrical and Computer Engineering
- 19% Preț: 419.04 lei
- Preț: 369.78 lei
- Preț: 372.44 lei
- Preț: 370.52 lei
- 20% Preț: 371.46 lei
- Preț: 369.62 lei
- 20% Preț: 229.91 lei
- 20% Preț: 227.70 lei
- Preț: 370.52 lei
- Preț: 369.62 lei
- 20% Preț: 226.71 lei
- Preț: 369.62 lei
- Preț: 370.36 lei
- Preț: 435.78 lei
- Preț: 374.69 lei
- Preț: 370.52 lei
- Preț: 371.32 lei
- 20% Preț: 227.70 lei
- Preț: 369.23 lei
- Preț: 369.78 lei
- Preț: 369.62 lei
- Preț: 373.35 lei
- Preț: 368.87 lei
- Preț: 369.62 lei
- Preț: 370.94 lei
- 20% Preț: 314.73 lei
- Preț: 370.15 lei
- Preț: 334.92 lei
- Preț: 337.37 lei
- Preț: 371.48 lei
- 20% Preț: 318.12 lei
- Preț: 369.99 lei
- Preț: 371.10 lei
- 20% Preț: 315.19 lei
- 20% Preț: 226.16 lei
- Preț: 366.78 lei
- Preț: 367.91 lei
- Preț: 352.83 lei
- Preț: 373.76 lei
- Preț: 370.73 lei
- Preț: 368.67 lei
- 20% Preț: 317.47 lei
- Preț: 372.44 lei
- Preț: 368.08 lei
- 20% Preț: 314.73 lei
- Preț: 369.62 lei
- 5% Preț: 354.53 lei
- Preț: 370.52 lei
- Preț: 367.53 lei
- Preț: 368.67 lei
Preț: 401.19 lei
Nou
Puncte Express: 602
Preț estimativ în valută:
76.78€ • 79.75$ • 63.78£
76.78€ • 79.75$ • 63.78£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789811032349
ISBN-10: 9811032343
Pagini: 77
Ilustrații: VII, 78 p. 22 illus., 10 illus. in color.
Dimensiuni: 155 x 235 x 5 mm
Greutate: 0.14 kg
Ediția:1st ed. 2017
Editura: Springer Nature Singapore
Colecția Springer
Seriile SpringerBriefs in Electrical and Computer Engineering, SpringerBriefs in Signal Processing
Locul publicării:Singapore, Singapore
ISBN-10: 9811032343
Pagini: 77
Ilustrații: VII, 78 p. 22 illus., 10 illus. in color.
Dimensiuni: 155 x 235 x 5 mm
Greutate: 0.14 kg
Ediția:1st ed. 2017
Editura: Springer Nature Singapore
Colecția Springer
Seriile SpringerBriefs in Electrical and Computer Engineering, SpringerBriefs in Signal Processing
Locul publicării:Singapore, Singapore
Cuprins
Introduction.- Secure Data Aggregation in Wireless Sensor Network.- Privacy preserving Meter Reading Transmission in Smart Grid.- Key Agreement and Management in Vehicular Ad-hoc Network.- Conclusion.
Notă biografică
Liehuang Zhu is a professor in the School of Computer Science and Technology at Beijing Institute of Technology. He has been selected for the Program for New Century Excellent Talents in University from Ministry of Education, P.R. China. He has also won the Third Class Prize of the National Science and Technology Progress Award, P.R. China. He is a member of Association for Computing Machinery, China Computer Federation (CCF), vice president of CCF Young Computer Scientists and Engineers Forum, executive director of Cyber Security Association of China, executive director of Chinese Association for Artificial Intelligence, chair for International Conference on Trustworthy Systems 2011 and 2014, and associate editor for Journal of Frontiers of Computer Science. His research interests include cryptographic protocols and their applications, cloud computing security, privacy preserving in smart grid, wireless communication security, and mobile security.
Zijian Zhangis an assistant professor in the School of Computer Science and
Technology at Beijing Institute of Technology. He is a member of Association for Computing Machinery, China Computer Federation (CCF), and CCF Young
Computer Scientists and Engineers Forum. He is also a chair for 2016 IEEE Cyber Science and Technology Congress, Special Session on Cyber Security and Privacy with Network Log Analytics, and IEEE CCNC 2014 Special Session on Game Theory in Mobile Internet. His research interests include formal security analysis of cryptographic protocols, privacy preserving in smart grid and mobile security.
Chang Xu received the Ph.D. degree in computer science from Beihang University, Beijing, China, in 2013. From Feb 2015 to Feb 2016, she was a visiting scholar with Nanyang Technological University. Since July 2013, she has been an assistant professor in School of Computer Science and Technology at Bejing Institute of Technology. She is a program committee member of SPPCN 2015 and SPPCN 2014, a reviewer of IEEE Transactions on Cloud Computing, Security and Communication Networks, Globecom 2016, Intrust 2014, etc. She is also a guest editor of Mobile Information System , special issue on " Security and Privacy Challenges in Vehicular Cloud Computing", 2016. Her research interests include security & privacy in Wireless Network, security & privacy in cloud computing system, security & privacy in VANET, and applied cryptography.
Caracteristici
Summarizes the latest technology in data security and privacy in the Internet of Things Provides the source code for all the new technologies in the wireless sensor network, smart grid and vehicular ad-hoc network applications Clarifies the differences between the security of all the cryptographic-based schemes Includes supplementary material: sn.pub/extras