Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Network Simulation and Evaluation
  • Language: en
  • Pages: 451

Network Simulation and Evaluation

None

Privacy in Vehicular Networks
  • Language: en
  • Pages: 188

Privacy in Vehicular Networks

  • Type: Book
  • -
  • Published: 2025-02-17
  • -
  • Publisher: CRC Press

In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge. Privacy in Vehicular Networks delves into the complexities of protecting sensitive location data within the dynamic and decentralized environment of vehicular networks. This book stands out by addressing both the theoretical and practical aspects of location privacy, offering a thorough analysis of existing vulnerabilities and innovative solutions. This book meticulously examines the interplay between location privacy and the operational necessities of road networks. It introduces a differential privacy framework tailored specifically for ...

Network and Parallel Computing
  • Language: en
  • Pages: 574

Network and Parallel Computing

  • Type: Book
  • -
  • Published: 2007-09-18
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2007. It covers network applications: cluster and grid computing, peer-to-peer computing; network technologies: network algorithms, network reliability and dependability; network and parallel architectures: multicore design issues, performance modeling and evaluation; and parallel and distributed software: data mining, parallel programming tools and compilers.

Communications and Networking
  • Language: en
  • Pages: 569

Communications and Networking

This proceedings constitutes the refereed proceedings of the 16th International Conference on Communications and Networking, ChinaCom 2021, held in November 2021. Due to COVID-19 pandemic the conference was held virtually. The 47 full papers and 5 workshop papers presented were carefully selected from 130 submissions. The papers are organized in topical sections on Scheduling and Transmission Optimization in Edge Computing; Complex System Optimization in Edge Computing; Network Communication Enhancement; Signal Processing and Communication Optimization; Deep Learning and Vehicular Communication; Edge Computing and Deep Learning; Finite Blocklength and Distributed Machine Learning; Deep Learning and Network Performance Optimization; Edge Computing and Reinforcement Learning.

Information and Communication Security
  • Language: en
  • Pages: 444

Information and Communication Security

This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.

Network and System Security
  • Language: en
  • Pages: 740

Network and System Security

This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

Information Security and Privacy
  • Language: en
  • Pages: 674

Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic.

IoT as a Service
  • Language: en
  • Pages: 460

IoT as a Service

None

Information and Communications Security
  • Language: en
  • Pages: 485

Information and Communications Security

  • Type: Book
  • -
  • Published: 2010-12-06
  • -
  • Publisher: Springer

Annotation. This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Barcelona, Spain, in December 2010. The 31 revised full papers presented together with an invited talk were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on access control, public key cryptography and cryptanalysis, security in distributed and mobile systems, cryptanalysis, authentication, fair exchange protocols, anonymity and privacy, software security, proxy cryptosystems, and intrusion detection systems.

Security and Privacy in Social Networks and Big Data
  • Language: en
  • Pages: 456

Security and Privacy in Social Networks and Big Data

This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.