Listing 1 - 5 of 5 |
Sort by
|
Choose an application
This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in smart grids. The brief is designed for researchers and professionals working with computer communication networks and smart grids. Graduate students interested in networks and communication engineering will also find the brief an essential resource.
Smart power grids --- Computer networks --- Internet --- Security measures. --- Grids, Smart power --- Power grids, Smart --- Smart grids (Electric power distribution) --- Electric power distribution --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Automation --- Computer Communication Networks. --- Telecommunication. --- Communications Engineering, Networks. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Computer communication systems. --- Electrical engineering. --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in smart grids. The brief is designed for researchers and professionals working with computer communication networks and smart grids. Graduate students interested in networks and communication engineering will also find the brief an essential resource.
Telecommunication technology --- Mass communications --- Computer science --- Computer architecture. Operating systems --- computers --- tekstverwerking --- computernetwerken --- computerkunde --- communicatietechnologie
Choose an application
Aeronautical instruments --- Automatic dependent surveillance--broadcast (Air traffic control) --- Aeronautical instruments. --- Display systems. --- Aeronautics --- Aircraft instruments --- Airplanes --- Instruments, Aeronautical --- Electronic instruments --- ADS-B (Air traffic control) --- Aids to air navigation --- Air traffic control --- Airborne display systems --- Pictorial display systems, Airborne --- Pictorial navigation displays --- Information display systems --- Instruments
Choose an application
This book constitutes the workshop proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018. The 24 full papers presented were carefully selected and reviewed from numerous submissions to the two following workshops: - ICA3PP 2018 Workshop on Intelligent Algorithms for Large-scale Complex Optimization Problems - ICA3PP 2018 Workshop on Security and Privacy in Data Processing .
Computer software. --- Computer Communication Networks. --- Data encryption (Computer science). --- Computer security. --- Artificial intelligence. --- Algorithm Analysis and Problem Complexity. --- Cryptology. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Software, Computer --- Protection --- Security measures --- Parallel processing (Electronic computers) --- Algorithms. --- Computer communication systems. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Algorism --- Algebra --- Arithmetic --- Distributed processing --- Foundations --- Computer networks. --- Cryptography. --- Data protection. --- Data and Information Security. --- Computer and Information Systems Applications. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
This book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five different angles. First, the authors examine encryption schemes applied to the ADS-B environment for protecting messages confidentiality. Second, they propose an ADS-B broadcast authentication scheme with batch verification by employing an identity-based signature. Third, they present ADS-B broadcast authentication scheme based on a digital signature with message recovery, which provides a feature that the message is recoverable from the signature. Fourth, they propose a new cryptographic solution to ADS-B security. Finally, they propose an accurate and efficient cognitive aircraft location verification scheme preserving aircraft location privacy by utilizing a grid-based k-nearest neighbor algorithm. In summary, the authors show how ADS-B data links can greatly enhance flight safety by these proposed schemes without sacrificing data security.
Telecommunication technology --- Mass communications --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- fuzzy logic --- cybernetica --- tekstverwerking --- algoritmen --- KI (kunstmatige intelligentie) --- computernetwerken --- communicatietechnologie
Listing 1 - 5 of 5 |
Sort by
|