Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Transport engineering --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- motorrijtuigen --- ingenieurswetenschappen --- computernetwerken --- mobiele communicatie --- Mobile communication systems. --- Vehicular ad hoc networks (Computer networks) --- Radiocommunications mobiles. --- Intelligent vehicular ad hoc networks (Computer networks) --- Inter-vehicle ad-hoc networks --- VANETs --- Vehicluar networks (Computer networks) --- Ad hoc networks (Computer networks) --- Intelligent transportation systems --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Communication systems --- Motorcars engineering --- digitale elektronica --- internet
Choose an application
Vehicular ad hoc networks (Computer networks) --- Safety measures. --- Intelligent vehicular ad hoc networks (Computer networks) --- Inter-vehicle ad-hoc networks --- VANETs --- Vehicluar networks (Computer networks) --- Ad hoc networks (Computer networks) --- Intelligent transportation systems
Choose an application
Computer architecture. Operating systems --- Computer. Automation --- informatica --- computerbeveiliging --- netwerk management
Choose an application
Choose an application
This book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five different angles. First, the authors examine encryption schemes applied to the ADS-B environment for protecting messages confidentiality. Second, they propose an ADS-B broadcast authentication scheme with batch verification by employing an identity-based signature. Third, they present ADS-B broadcast authentication scheme based on a digital signature with message recovery, which provides a feature that the message is recoverable from the signature. Fourth, they propose a new cryptographic solution to ADS-B security. Finally, they propose an accurate and efficient cognitive aircraft location verification scheme preserving aircraft location privacy by utilizing a grid-based k-nearest neighbor algorithm. In summary, the authors show how ADS-B data links can greatly enhance flight safety by these proposed schemes without sacrificing data security.
Telecommunication technology --- Mass communications --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- fuzzy logic --- cybernetica --- tekstverwerking --- algoritmen --- KI (kunstmatige intelligentie) --- computernetwerken --- communicatietechnologie
Choose an application
This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice interface - application platform". For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network. Discusses securing IoT-driven smart home networks on the mobile device, user interface, and application platform. Provides thorough security analysis, existing countermeasures, and proposed novel solutions for each component. Includes a comprehensive full-stack sight view of smart home's security and privacy issues.
Telecommunication technology --- Mass communications --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- fuzzy logic --- cybernetica --- tekstverwerking --- computerbeveiliging --- KI (kunstmatige intelligentie) --- computernetwerken --- communicatietechnologie
Choose an application
Choose an application
This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers. The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues.
Choose an application
Telecommunication technology --- Mass communications --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- draadloze computernetwerken --- hybridevoertuigen --- IoT (Internet of Things) --- mobiele netwerken --- deep learning --- tekstverwerking --- KI (kunstmatige intelligentie) --- mobiele communicatie --- communicatietechnologie
Choose an application
This book investigates intelligent network resource management for IoV, with the objective of maximizing the communication and computing performance of vehicle users. Focusing on two representative use cases in IoV, i.e., safety message broadcast and autonomous driving, the authors propose link-layer protocol design and application-layer computing task scheduling to achieve the objective given the unique characteristics and requirements of IoV. In particular, this book illustrates the challenges of resource management for IoV due to network dynamics, such as time-varying traffic intensity and vehicle mobility, and presents intelligent resource management solutions to adapt to the network dynamics. The Internet of Vehicles (IoV) enables vehicle-to-everything connectivity and supports a variety of applications for vehicles on the road Intelligent resource management is critical for satisfying demanding communication and computing requirements on IoV, while the highly dynamic network environments pose challenges to the design of resource management schemes. This book provides insights into the significance of adaptive resource management in improving the performance of IoV. The customized communication protocol and computing scheduling scheme are designed accordingly by taking the network dynamics information as an integral design factor. Moreover, the decentralized designs of the proposed solutions guarantee low signaling overhead and high scalability. A comprehensive literature review summarizing recent resource management schemes in IoV, followed by the customized design of communication and computing solutions for the two IoV use cases is included which can serve as a useful reference for professionals from both academia and industry in the area of IoV and resource management. Researchers working within this field and computer science and electrical engineering students will find this book useful as well.
Transport. Traffic --- Computer architecture. Operating systems --- verkeer --- transport --- computernetwerken --- mobiele communicatie
Listing 1 - 10 of 10 |
Sort by
|