Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Systems Security
  • Language: en
  • Pages: 297

Information Systems Security

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.

Emerging Real-World Applications of Internet of Things
  • Language: en
  • Pages: 264

Emerging Real-World Applications of Internet of Things

  • Type: Book
  • -
  • Published: 2022-11-24
  • -
  • Publisher: CRC Press

The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet. These objects or things are devices ranging from simple handheld devices to complex industrial heavy machines. A thing in IoT can be any living or non-living object that can be provided capabilities to sense, process, and exchange data over a network. The IoT provides people with the ability to handle their household works to industrial tasks smartly and efficiently without the intervention of another human. The IoT provid...

Blockchain for Cyberphysical Systems
  • Language: en
  • Pages: 310

Blockchain for Cyberphysical Systems

  • Type: Book
  • -
  • Published: 2020-09-30
  • -
  • Publisher: Artech House

This exciting book will explore how Blockchain (BC) technology has the potential to overcome challenges in the current cyber-physical system (CPS) environment. BC is a timestamp ledger of blocks that is used for storing and sharing data in a distributed manner. BC has attracted attention from practitioners and academics in different disciplines, including law, finance, and computer science, due to its use of distributed structure, immutability and security and privacy. However, applying blockchain in a cyber-physical system (CPS) is not straightforward and involves challenges, including lack of scalability, resource consumption, and delay. This book will provide a comprehensive study on bloc...

Distributed Computing and Internet Technology
  • Language: en
  • Pages: 586

Distributed Computing and Internet Technology

  • Type: Book
  • -
  • Published: 2013-01-11
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 9th International Conference on Distributed Computing and Internet Technology, ICDCIT 2013, held in Bhubaneswar, India, in February 2013. The 40 full papers presented together with 5 invited talks in this volume were carefully reviewed and selected from 164 submissions. The papers cover various research aspects in distributed computing, internet technology, computer networks, and machine learning.

Security in Ad Hoc and Sensor Networks
  • Language: en
  • Pages: 419

Security in Ad Hoc and Sensor Networks

Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas. Sample Chapter(s). Chapter 1: Authentication and Confidentiality in Wireless Ad Hoc Networks (260 KB). Contents: Authentication and Confidentiality; Privacy; Routing; Reliability; Network Management and Configuration. Readership: Researchers, industry practitioners, graduate and undergraduate students in networking, network security, distributed security and sensor ad hoc security.

Fog and Edge Computing
  • Language: en
  • Pages: 512

Fog and Edge Computing

A comprehensive guide to Fog and Edge applications, architectures, and technologies Recent years have seen the explosive growth of the Internet of Things (IoT): the internet-connected network of devices that includes everything from personal electronics and home appliances to automobiles and industrial machinery. Responding to the ever-increasing bandwidth demands of the IoT, Fog and Edge computing concepts have developed to collect, analyze, and process data more efficiently than traditional cloud architecture. Fog and Edge Computing: Principles and Paradigms provides a comprehensive overview of the state-of-the-art applications and architectures driving this dynamic field of computing whil...

Data Science and Machine Learning
  • Language: en
  • Pages: 310

Data Science and Machine Learning

This book constitutes the proceedings of the 21st Australasian Conference on Data Science and Machine Learning, AusDM 2023, held in Auckland, New Zealand, during December 11–13, 2023. The 20 full papers presented in this book were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: research track and application track. They deal with topics around data science and machine learning in everyday life.

Blockchain and Applications
  • Language: en
  • Pages: 383

Blockchain and Applications

This book constitutes the refereed proceedings of the 1st International Congress on Blockchain and Applications 2021, BLOCKCHAIN’21, held in Salamanca, Spain, in October 2021. Among the scientific community, blockchain and artificial intelligence are a promising combination that will transform the production and manufacturing industry, media, finance, insurance, e-government, etc. Nevertheless, there is no consensus with schemes or best practices that would specify how blockchain and artificial intelligence should be used together. The 38 full papers presented were carefully reviewed and selected from over 44 submissions. They contain the latest advances on blockchain and artificial intelligence and on their application domains, exploring innovative ideas, guidelines, theories, models, technologies, and tools and identifying critical issues and challenges that researchers and practitioners must deal with in future research.

Theory and Practice of Cryptography Solutions for Secure Information Systems
  • Language: en
  • Pages: 611

Theory and Practice of Cryptography Solutions for Secure Information Systems

  • Type: Book
  • -
  • Published: 2013-05-31
  • -
  • Publisher: IGI Global

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Distributed Computing and Internet Technology
  • Language: en
  • Pages: 337

Distributed Computing and Internet Technology

  • Type: Book
  • -
  • Published: 2011-02-02
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 7th International Conference on Distributed Computing and Internet Technology, ICDCIT 2011, held in Bhubaneswar, India, in February 2011. The 18 papers presented in this volume were carefully reviewed and selected from 138 submissions. In addition the book contains the full versions of 6 invited talks. The papers are grouped in topical sections on distributed computing, sensor networks, internet technologies and applications, security, and bio-inspired computing.