TOP
月月讀書金,登入即領,滿600現折50!!
縮小範圍
搜尋結果 /

Security for Wireless Sensor Networks Using Identity-based Cryptography

605428
11 / 15136
出版日:2005/04/13 作者:Cristina Comaniciu; Narayan B. Mandayam; H. Vincent Poor  出版社:Springer-Verlag New York Inc  裝訂:精裝
Cross-layer design seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network, primarily the physical (PHY) and medium access con
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
WIRELESS AND MOBILE ALL-IP NETWORKS
95 折
出版日:2005/01/01 作者:YI-BING LIN; AI-CHUN PANG  出版社:全華經銷  裝訂:精裝
Looks at the number one advancement currently emerging from 3GPP (Third Generation Partnership Project) in global wireless growth: the development of wireless applications based only on the Internet P
優惠價: 95 1140
無庫存
Mobile Ad hoc NETworks (MANETs) has attracted great research interest in recent years. A Mobile Ad Hoc Network is a self-organizing multi-hop wireless network where all hosts (often called nodes) part
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
Cryptography For Dummies
滿額折
出版日:2004/01/16 作者:Cobb  出版社:John Wiley & Sons Inc  裝訂:平裝
Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking This invaluable introduction to the ba
優惠價: 9 1368
無庫存
出版日:2003/01/28 作者:Dubendorf  出版社:John Wiley & Sons Inc  裝訂:精裝
The expansion and popularity of the Internet, along with the addition of wireless data functionality to wireless networks, has also contributed greatly to the growth of the wireless industry. In fact,
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2002/12/01 作者:Bruce Potter; Bob Fleck  出版社:Oreilly & Associates Inc  裝訂:平裝
Discusses the fundamentals of wireless security and of the popular wireless LAN protocol 802.11, covering topics including station security configurations, network weaknesses, access points, and clien
優惠價: 1 1330
無庫存
出版日:2002/09/27 作者:Massam  出版社:John Wiley & Sons Inc  裝訂:精裝
QoS (Quality of Service) and Network Management are old topics. However, the fusion of IP style multimedia and wireless networks (3G) means that network managers who might previously have dealt with o
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:1996/11/28 作者:Gertjan Dijkink  出版社:Routledge UK  裝訂:平裝
National Identity and Geopolitical Visions searches for national orientations in the relationship of a people with the world, a relationship based on the desire for state security and for an influenc
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2022/05/31 作者:David López-Pérez  出版社:Cambridge Univ Pr  裝訂:精裝
Discover the fundamental characteristics of ultra-dense networks with this comprehensive text. Featuring a consistent mathematical description of ultra-dense small cell networks while also covering real-world issues such as network deployment, operation and optimization, this book investigates performance metrics of coverage probability and area spectral efficiency (ASE) and addresses the aspects of ultra-dense networks that make them different from current networks. Insightful intuitions, which will assist decision-makers as they migrate their services, are explained and mathematically proven. The book presents the latest review of research outcomes on ultra-dense networks, based on both theoretical analyses and network simulations, includes over 200 sources from 3GPP, the Small Cell Forum, journals and conference proceedings, and covers all other related and prominent topics. This is an ideal reference text for professionals who are dealing with the development, deployment, operation
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2020/06/30 作者:Dusit Niyato  出版社:Cambridge Univ Pr  裝訂:精裝
Do you have the tools to address recent challenges and problems in modern computer networks? Discover a unified view of auction theoretic applications and develop auction models, solution concepts, and algorithms with this multidisciplinary review. Devise distributed, dynamic, and adaptive algorithms for ensuring robust network operation over time-varying and heterogeneous environments, and for optimizing decisions about services, resource allocation, and usage of all network entities. Topics including cloud networking models, MIMO, mmWave communications, 5G, data aggregation, task allocation, user association, interference management, wireless caching, mobile data offloading, and security. Introducing fundamental concepts from an engineering perspective and describing a wide range of state-of-the-art techniques, this is an excellent resource for graduate and senior undergraduate students, network and software engineers, economists, and researchers.
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2019/11/30 作者:K. J. Ray Liu  出版社:Cambridge Univ Pr  裝訂:精裝
With this groundbreaking text, discover how wireless artificial intelligence (AI) can be used to determine position at centimeter level, sense motion and vital signs, and identify events and people. Using a highly innovative approach that employs existing wireless equipment and signal processing techniques to turn multipaths into virtual antennas, combined with the physical principle of time reversal and machine learning, it covers fundamental theory, extensive experimental results, and real practical use cases developed for products and applications. Topics explored include indoor positioning and tracking, wireless sensing and analytics, wireless power transfer and energy efficiency, 5G and next-generation communications, and the connection of large numbers of heterogeneous IoT devices of various bandwidths and capabilities. Demo videos accompanying the book online enhance understanding of these topics. Providing a unified framework for wireless AI, this is an excellent text for gradu
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2019/09/24 作者:Gisela Bichler  出版社:Univ of California Pr  裝訂:精裝
Understanding Criminal Networks is a short methodological primer for those interested in studying illicit, deviant, covert, or criminal networks using social network analysis (SNA). Accessibly written
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2019/09/10 作者:Gisela Bichler  出版社:Univ of California Pr  裝訂:平裝
Understanding Criminal Networks is a short methodological primer for those interested in studying illicit, deviant, covert, or criminal networks using social network analysis (SNA). Accessibly written
優惠價: 1 2097
無庫存
出版日:2018/12/07 作者:Anupam Chattopadhyay (EDT); Chester Rebeiro (EDT); Yuval Yarom (EDT)  出版社:Springer-Nature New York Inc  裝訂:平裝
This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018. The
優惠價: 1 3499
無庫存
出版日:2018/10/09 作者:Lili Mou; Zhi Jin  出版社:Springer-Nature New York Inc  裝訂:平裝
This book proposes a novel neural architecture, tree-based convolutional neural networks (TBCNNs),for processing tree-structured data. TBCNNsare related to existing convolutional neural networks (CNNs
優惠價: 1 3499
無庫存
The Science of Biometrics ― Security Technology for Identity Verification
90 折
出版日:2018/07/21 作者:Ravindra Das  出版社:CRC Pr I Llc  裝訂:平裝
The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms
優惠價: 9 2793
無庫存
出版日:2018/07/19 作者:Ravindra Das  出版社:CRC Pr I Llc  裝訂:精裝
The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
Cyber Security Cryptography and Machine Learning ― Second International Symposium, Cscml 2018, Be'er Sheva, Israel, June 21?2, 2018, Proceedings
90 折
出版日:2018/06/17 作者:Itai Dinur (EDT); Shlomi Dolev (EDT); Sachin Lodha (EDT)  出版社:Springer-Verlag New York Inc  裝訂:平裝
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.The 16 fu
優惠價: 9 2835
無庫存
出版日:2018/06/12 作者:Bart Preneel (EDT); Frederik Vercauteren (EDT)  出版社:Springer-Verlag New York Inc  裝訂:平裝
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018.The 36 revised ful
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2018/03/28 作者:Liehuang Zhu (EDT); Sheng Zhong (EDT)  出版社:Springer-Verlag New York Inc  裝訂:平裝
This book constitutes the refereed proceedings of the 13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017, held in Beijing, China, in December 2017. The 39 revised full papers
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2018/01/29 作者:Fadi Al-Turjman  出版社:CRC Pr I Llc  裝訂:精裝
This book investigates the problem of WSNs deployments that address intrinsic properties of Outdoor Environment Monitoring (OEM) networks in order to overcome the unique challenges and circumstances i
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2017/12/23 作者:Aggelos Kiayias (EDT)  出版社:Springer-Verlag New York Inc  裝訂:平裝
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 201
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
Security, Privacy, and Applied Cryptography Engineering ― 7th International Conference, Space 2017, Goa, India, December 13-17, 2017, Proceedings
90 折
出版日:2017/11/22 作者:Subidh Ali (EDT); Jean-luc Danger (EDT); Thomas Eisenbarth (EDT)  出版社:Springer-Verlag New York Inc  裝訂:平裝
This book constitutes the refereed proceedings of the 7th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2017, held in Goa, India, in December 2017. The 13
優惠價: 9 2835
無庫存
出版日:2017/09/20 作者:Massimo Ficco (EDT); Francesco Palmieri (EDT)  出版社:Academic Pr  裝訂:平裝
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks presents current, state-of-the-art work on novel research in theoretical and practical resilience and security as
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
Optimal Control of Energy Resources for State Estimation over Wireless Channels
90 折
出版日:2017/08/29 作者:Alex S. Leong; Daniel E. Quevedo; Subhrakanti Dey  出版社:Springer Verlag  裝訂:平裝
This brief introduces wireless communications ideas and techniques into the study of networked control systems. It focuses on state estimation problems in which sensor measurements (or related quantit
優惠價: 9 2835
無庫存
出版日:2017/08/17 作者:Liansheng Tan  出版社:CRC Pr I Llc  裝訂:精裝
This book provides a comprehensive introduction to the underlying theory, design techniques and analytical results of wireless communication networks, focusing on the core principles of wireless netwo
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information s
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
Mobile Microrobotics
79 折
出版日:2017/06/09 作者:Metin Sitti  出版社:Mit Pr  裝訂:精裝
Progress in micro- and nano-scale science and technology has created a demand for new microsystems for high-impact applications in healthcare, biotechnology, manufacturing, and mobile sensor networks.
優惠價: 79 1952
無庫存
Cyber Security Cryptography and Machine Learning ― First International Conference, Cscml 2017, Beer-sheva, Israel, June 29-30, 2017, Proceedings
90 折
出版日:2017/06/03 作者:Shlomi Dolev (EDT); Sachin Lodha (EDT)  出版社:Springer-Verlag New York Inc  裝訂:平裝
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017.The 17 full and 4 short papers
優惠價: 9 3240
無庫存
出版日:2017/04/30 作者:Lingyang Song  出版社:Cambridge Univ Pr  裝訂:精裝
Learn about the key technologies and understand the state of the art in research for full-duplex communication networks and systems with this comprehensive and interdisciplinary guide. Incorporating physical, MAC, network, and application layer perspectives, it explains the fundamental theories on which full-duplex communications are built, and lays out the techniques needed for network design, analysis and optimization. Techniques covered in detail include self-interference cancellation and signal processing algorithms, physical layer algorithms, methods for efficient resource allocation, and game theory. Potential applications and networking schemes are discussed, including full-duplex cognitive radio networks, cooperative networks, and heterogeneous networks. The first book to focus exclusively on full-duplex communications, this is an indispensable reference for both researchers and practitioners designing the next generation of wireless networks.
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2017/02/22 作者:Yanru Zhang; Zhu Han  出版社:Springer-Verlag New York Inc  裝訂:精裝
This book presents theoretical research between wireless communications, networking, and economics using the framework of contract theory. This work fills a void in the literature by closely combining
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
Governing Borderless Threats ― Non-traditional Security and the Politics of State Transformation
滿額折
出版日:2017/02/02 作者:Lee Jones  出版社:Cambridge Univ Pr  裝訂:平裝
'Non-traditional' security problems like pandemic diseases, climate change and terrorism now pervade the global agenda. Many argue that sovereign state-based governance is no longer adequate, demanding and constructing new approaches to manage border-spanning threats. Drawing on critical literature in political science, political geography and political economy, this is the first book that systematically explains the outcomes of these efforts. It shows that transboundary security challenges are primarily governed not through supranational organisations, but by transforming state apparatuses and integrating them into multilevel, regional or global regulatory governance networks. The socio-political contestation shaping this process determines the form, content and operation of transnational security governance regimes. Using three in-depth case studies - environmental degradation, pandemic disease, and transnational crime - this innovative book integrates global governance and internati
優惠價: 9 1403
無庫存
出版日:2016/11/21 作者:Ahmed Khattab; Zahra Jeddi; Esmaeil Amini; Magdy Bayoumi  出版社:Springer Verlag  裝訂:精裝
This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2016/09/26 作者:Penttinen  出版社:John Wiley & Sons Inc  裝訂:精裝
The development of the wireless communications environment, especially as related to security, has been relatively stable compared to the issues of fixed Internet. Nevertheless, along with the enhance
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2016/02/18 作者:Larry Bogad  出版社:Productivity Press  裝訂:精裝
In this book, author Mrio Marques da Silva presents readers with a comprehensive resource on the theory and practice of networking, wireless and cable communications, and networking security
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
出版日:2015/09/15 作者:Hamid Asgari; Xiaoqi Chen  出版社:Productivity Press  裝訂:精裝
This book presents novel methodologies for modeling, simulation and control of gas turbines using ANN (Artificial Neural Networks). Readers will learn how artificial intelligent techniques can be used
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
Financial Cryptography and Data Security ― Fc 2015 International Workshops, Bitcoin, Wahc, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers
90 折
出版日:2015/09/14 作者:Michael Brenner (EDT); Nicolas Christin (EDT); Benjamin Johnson (EDT); Kurt Rohloff (EDT)  出版社:Springer Verlag  裝訂:平裝
This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2
優惠價: 9 2520
無庫存
出版日:2015/08/21 作者:E. S. Gopi  出版社:Springer Verlag  裝訂:精裝
This book examines signal processing techniques used in wireless communication illustrated by using the Matlab program. The author discusses these techniques as they relate to Doppler spread, Delay sp
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
Financial Cryptography and Data Security ― 19th International Conference Fc 2015 San Juan, Puerto Rico January 26-30 2015, Selected Papers
90 折
出版日:2015/07/27 作者:Rainer B?柒e (EDT); Tatsuaki Okamoto (EDT)  出版社:Springer Verlag  裝訂:平裝
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in J
優惠價: 9 3240
無庫存
Intelligence-based Security in Private Industry
90 折
出版日:2015/07/17 作者:Thomas A. Trier  出版社:Productivity Press  裝訂:精裝
There is a definite need/desire for intelligence-based security throughout the private security industry. An effective in-house intelligence function can help companies identify, evaluate, and mitigat
優惠價: 9 2833
無庫存
  • 605428
    15136
  • 1
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 15136

暢銷榜

客服中心

收藏

會員專區