You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, PSATS 2010, held in Rome, Italy, Februray 2010. The conference included a keynote speech, 4 regular technical tracks and 4 special sessions consisting of 33 high-quality scientific papers. These cover various topics such as Satellite Communications: Coding and Modulations, Multimedia Integration, Satellite Network: Quality of Service and Architectures and Applications and Services, as well as Delay-Tolerant Networks, Quantum Satellite Communications, Access Quality Processing and Applications of Satellite Imagery.
This workshop proceedings introduces the latest innovations and trends in IP-based applications and satellite networking. It explains many aspects of advanced satellite networking systems, such as deployment of IPv6 over satellites, working with WLAN and WiMax, and rules concerning multi-segment networks. In addition, the book covers hot-button issues such as security, architecture improvement, resource allocation, video networking, and service integration.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Personal Satellite Services, PSATS 2011, held in Malaga, Spain, in February 2011. The 33 revised full papers presented were carefully reviewed and selected and cover a wide range of topics such as multimedia IP, next generation satellite networks, bandwidth allocation, aeronautic communications for air traffic management, DVB-S2, hybrid networks, delay tolerant networking, channel estimation and interference management, satellite antenna design, and localization systems.
This book constitutes the proceedings of the 28th International Tyrrhenian Workshop on Digital Communication, TIWDC 2017, which took place in Palermo, Italy, in September 2017. The 18 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: biometric systems; emerging services with Network Function Virtualization (NFV); multimedia forensics; security protocols; software defined networks; and technologies for Internet of Things (IoT).
We live in a wireless society, one where convenience and accessibility determine the efficacy of the latest electronic gadgets and mobile devices. Making the most of these technologies—and ensuring their security against potential attackers—requires increased diligence in mobile technology research and development. Mobile Computing and Wireless Networks: Concepts, Methodologies, Tools, and Applications brings together a comprehensive range of voices and research in the area of mobile and wireless technologies, exploring the successes and failures, advantages and drawbacks, and benefits and limitations of the technology. With applications in a plethora of different research and topic areas, this multi-volume reference work benefits researchers, service providers, end-users, and information technology professionals. This four-volume reference work includes a diverse array of chapters and authors covering topics such as m-commerce, network ethics, mobile agent systems, mobile learning, communications infrastructure, and applications in fields such as business, healthcare, government, tourism, and more.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on Personal Satellite Services, PSATS 2012, held in Bradford, UK, in March 2012. The 22 revised full papers presented together with 4 poster sessions were carefully reviewed and selected from various submissions. The papers cover topics such as radio resource management; spectrum/interference management and antenna design; mobility and security; and protocol performance in satellite networks.
AN ESSENTIAL GUIDE TO USING BLOCKCHAIN TO PROVIDE FLEXIBILITY, COST-SAVINGS, AND SECURITY TO DATA MANAGEMENT, DATA ANALYSIS, AND INFORMATION SHARING Blockchain for Distributed Systems Security contains a description of the properties that underpin the formal foundations of Blockchain technologies and explores the practical issues for deployment in cloud and Internet of Things (IoT) platforms. The authors—noted experts in the field—present security and privacy issues that must be addressed for Blockchain technologies to be adopted for civilian and military domains. The book covers a range of topics including data provenance in cloud storage, secure IoT models, auditing architecture, and e...
Anticipate the security and privacy threats of the future with this groundbreaking text The development of the next generation of mobile networks (6G), which is expected to be widely deployed by 2030, promises to revolutionize the Internet of Things (IoT), interconnecting a massive number of IoT devices (massive IoT) on a scale never before envisioned. These devices will enable the operation of a wide spectrum of massive IoT applications such as immersive smart cities, autonomous supply chain, flexible manufacturing and more. However, the vast number of interconnected IoT devices in the emerging massive IoT applications will make them vulnerable to an unprecedented variety of security and pr...
This book contains a selection of papers presented at a symposium organized under the aegis of COST Telecommunications Action 285. COST (European Cooperation in the field of Scientific and Technical Research) is a framework for scientific and technical cooperation, allowing the coordination of national research on a European level. Action 285 sought to enhance existing tools and develop new modeling and simulation tools.
This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020. The conference was planned to take place in Guildford, UK, but had to be moved to an online format due to the COVID-19 pandemic. The workshop took place during September 17-18, 2020. The 8 papers presented in this volume were carefully reviewed and selected from 20 submissions. They were organized in topical sections on security properties and attacks; confidentiality schema and security processes.