Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Mobile Cloud Computing
  • Language: en
  • Pages: 336

Mobile Cloud Computing

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devic...

Attribute-Based Encryption and Access Control
  • Language: en
  • Pages: 339

Attribute-Based Encryption and Access Control

  • Type: Book
  • -
  • Published: 2020-02-25
  • -
  • Publisher: CRC Press

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data acc...

Holistic Approach to Quantum Cryptography in Cyber Security
  • Language: en
  • Pages: 256

Holistic Approach to Quantum Cryptography in Cyber Security

  • Type: Book
  • -
  • Published: 2022-08-09
  • -
  • Publisher: CRC Press

This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography and also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques’ architectures and design, cyber security techniques management, software-defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology.

New Directions of Modern Cryptography
  • Language: en
  • Pages: 404

New Directions of Modern Cryptography

  • Type: Book
  • -
  • Published: 2012-12-06
  • -
  • Publisher: CRC Press

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field. The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from t...

Modeling and Design of Secure Internet of Things
  • Language: en
  • Pages: 704

Modeling and Design of Secure Internet of Things

An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces intr...

Adaptive Autonomous Secure Cyber Systems
  • Language: en
  • Pages: 291

Adaptive Autonomous Secure Cyber Systems

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative perfo...

Mobile Computing, Applications, and Services
  • Language: en
  • Pages: 440

Mobile Computing, Applications, and Services

  • Type: Book
  • -
  • Published: 2012-04-23
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Mobile Computing, Applications, and Services (MobiCASE 2010) held in Santa Clara, CA, USA, during October 25-28, 2010. The 15 revised full papers presented were carefully selected from numerous submissions. Conference papers are organized in six technical sessions, covering the topics of mobile Web and mash-ups, software engineering and development tools, cross-layer approaches, location-based services, mobile healthcare, and mobile social networking. Furthermore the volume includes two workshops on mobile computing and mobile security as well as four poster papers.

Proceedings of the Third International Afro-European Conference for Industrial Advancement — AECIA 2016
  • Language: en
  • Pages: 382

Proceedings of the Third International Afro-European Conference for Industrial Advancement — AECIA 2016

  • Type: Book
  • -
  • Published: 2017-08-15
  • -
  • Publisher: Springer

The Afro-European Conference for Industrial Advancement (AECIA) brought together the foremost experts and excellent young researchers from Africa, Europe and the rest of the world to disseminate the latest results from various fields of engineering, information and communication technologies. This volume gathers the carefully selected papers from the third installment of the AECIA, which was held in Marrakech, Morocco from November 21 to 23, 2016. The papers address important topics like Automation Systems, Intelligent Techniques and Algorithms, Information and Communication Technology (ICT) Applications in Engineering, Control, Optimization and Processing, as well as manufacturing-related topics. As such, it offers a valuable reference guide for researchers, students and practitioners in the fields of computer science and engineering.

Security in Distributed and Networking Systems
  • Language: en

Security in Distributed and Networking Systems

  • Type: Book
  • -
  • Published: Unknown
  • -
  • Publisher: Unknown

None

Healthcare Industry 4.0
  • Language: en
  • Pages: 186

Healthcare Industry 4.0

  • Type: Book
  • -
  • Published: 2023-08-28
  • -
  • Publisher: CRC Press

This book covers computer vision-based applications in digital healthcare industry 4.0, including different computer vision techniques, image classification, image segmentations, and object detection. Various application case studies from domains such as science, engineering, and social networking are introduced, along with their architecture and how they leverage various technologies, such as edge computing and cloud computing. It also covers applications of computer vision in tumor detection, cancer detection, combating COVID-19, and patient monitoring. Features: Provides a state-of-the-art computer vision application in the digital health care industry Reviews advances in computer vision ...