Listing 1 - 10 of 40 | << page >> |
Sort by
|
Choose an application
This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability theory, optimization, algorithm and protocol designs. All proposed mechanisms are evaluated by extensive simulations. Wireless Rechargeable Sensor Networks targets professionals and researchers working in networks, wireless communications, energy technology and information technology. Advanced-level students studying electrical engineering and computer science will also find this material useful as a study guide.
Computer Science. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Energy Technology. --- Computer science. --- Telecommunication. --- Electric engineering. --- Informatique --- Réseaux d'ordinateurs --- Télécommunications --- Storage batteries. --- Wireless sensor networks. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- WSNs (Sensor networks) --- Computer communication systems. --- Electric power production. --- Electrical engineering. --- Computer networks --- Low voltage systems --- Sensor networks --- Wireless communication systems --- Context-aware computing --- Energy Systems. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Energy systems. --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Computer networks.
Choose an application
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.
Choose an application
This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability theory, optimization, algorithm and protocol designs. All proposed mechanisms are evaluated by extensive simulations. Wireless Rechargeable Sensor Networks targets professionals and researchers working in networks, wireless communications, energy technology and information technology. Advanced-level students studying electrical engineering and computer science will also find this material useful as a study guide.
Choose an application
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.
Human rights --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- cryptografie --- informatica --- privacy --- netwerken (informatica) --- mobiele communicatie
Choose an application
It is our great pleasure to welcome you to the Fifth International Workshop on Security in Cloud Computing (SCC'17). This year's workshop continues its tradition of being the premier forum for the presentation of research results and experience reports on leading edge issues and challenges of cloud computing security. The mission of the workshop is to share novel solutions that fulfill the needs of secure and privacy-preserving cloud applications and services, and identify new directions for future research and development. SCC'17 gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the topics of cloud security and privacy such as secure cloud architecture, cloud storage security, cloud cryptography, cloud access control and key management, identification and privacy in cloud, secure computation outsourcing, trusted computing, and many others. The call for papers attracted 27 submissions from total 22 countries and regions. Those submissions were reviewed by 63 program committee members from 16 countries and regions. The program committee reviewed and accepted 11. We also encourage attendees to attend the keynote talk. The valuable and insightful talk will guide us to a better understanding on the promise of big data analytics in cyber security: Cloud Data Analytics for Security: Applications, Challenges, and Opportunities, Dr. Danfeng (Daphne) Yao (who is currently an associate professor of computer science at Virginia Tech).
Choose an application
This book includes selected peer reviewed articles presented at the 7th International Conference on Materials Engineering and Nanotechnology 2023 (ICMEN 2023) held on 04-05Nov at Kuala Lumpur in Malaysia. It highlights recent innovative approach and developments in materials engineering and nanotechnology fields. A broad range of topics and issues in modern materials science and nanotechnology are discussed, including advanced materials synthesis and characterization, nanoscale science and engineering, functional composite and nanomaterials, sustainable materials and green technologies. The importance and relevance of these proceedings lie in their contribution to the scientific community's collective knowledge and understanding of materials science/engineering and nanotechnology. By disseminating cutting-edge research findings and innovations, these proceedings foster collaboration, inspire new ideas, and push the boundaries of scientific discovery. Given its scope, this book will be of interest to a wide readership, including materials and nanotechnology engineers, scholars and researchers in science, technology and engineering disciplines.
Physics. --- Composite materials. --- Polymers. --- Nanotechnology. --- Nanoscience. --- Applied and Technical Physics. --- Composites. --- Nanoengineering. --- Nanophysics.
Choose an application
This book includes selected peer reviewed articles presented at the 7th International Conference on Materials Engineering and Nanotechnology 2023 (ICMEN 2023) held on 04-05Nov at Kuala Lumpur in Malaysia. It highlights recent innovative approach and developments in materials engineering and nanotechnology fields. A broad range of topics and issues in modern materials science and nanotechnology are discussed, including advanced materials synthesis and characterization, nanoscale science and engineering, functional composite and nanomaterials, sustainable materials and green technologies. The importance and relevance of these proceedings lie in their contribution to the scientific community's collective knowledge and understanding of materials science/engineering and nanotechnology. By disseminating cutting-edge research findings and innovations, these proceedings foster collaboration, inspire new ideas, and push the boundaries of scientific discovery. Given its scope, this book will be of interest to a wide readership, including materials and nanotechnology engineers, scholars and researchers in science, technology and engineering disciplines.
Physics. --- Composite materials. --- Polymers. --- Nanotechnology. --- Nanoscience. --- Applied and Technical Physics. --- Composites. --- Nanoengineering. --- Nanophysics. --- Materials science --- Nanostructured materials --- Nanotechnology
Choose an application
Physics --- Macromolecules --- Chemical structure --- Materials sciences --- Electrical engineering --- Applied physical engineering --- Biotechnology --- toegepaste wetenschappen --- materiaalproductie --- nanotechniek --- biotechnologie --- ingenieurswetenschappen --- fysica --- polymeren
Choose an application
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2020, held in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 19 revised full papers were carefully reviewed and selected from 49 submissions. The papers are organized thematically in tracks on Network Reliability and Security an Emerging Applications.
Computer communication systems. --- Architecture, Computer. --- Computers. --- Computer science—Mathematics. --- Computer Communication Networks. --- Computer System Implementation. --- Information Systems and Communication Service. --- Mathematics of Computing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Computer networks --- Quality control --- Security measures --- Reliability
Choose an application
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2020, held in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 19 revised full papers were carefully reviewed and selected from 49 submissions. The papers are organized thematically in tracks on Network Reliability and Security an Emerging Applications.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- programmeren (informatica) --- wiskunde --- computernetwerken
Listing 1 - 10 of 40 | << page >> |
Sort by
|