Information Security Theory and Practice. Securing the Internet of Things

Information Security Theory and Practice. Securing the Internet of Things
Author : David Naccache
Publisher : Springer
Total Pages : 201
Release : 2014-06-25
ISBN 10 : 9783662438268
ISBN 13 : 3662438267
Language : EN, FR, DE, ES & NL

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.

Information Security Theory and Practice. Securing the Internet of Things
Language: en
Pages: 201
Authors: David Naccache
Categories: Computers
Type: BOOK - Published: 2014-06-25 - Publisher: Springer

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held i
Information Security Theory and Practice
Language: en
Pages: 253
Authors: Maryline Laurent
Categories: Computers
Type: BOOK - Published: 2020-03-02 - Publisher: Springer Nature

This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, hel
Mobile Platforms, Design, and Apps for Social Commerce
Language: en
Pages: 411
Authors: Pelet, Jean-√Čric
Categories: Business & Economics
Type: BOOK - Published: 2017-05-17 - Publisher: IGI Global

While social interactions were once a personal endeavor, more contact is now done virtually. Mobile technologies are an ever-expanding area of research which ca
UAV Networks and Communications
Language: en
Pages: 259
Authors: Jae H. Kim
Categories: Technology & Engineering
Type: BOOK - Published: 2018 - Publisher: Cambridge University Press

The first book to focus on communications and networking in UAVs, covering theory, applications, regulation, policy, and implementation.
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications
Language: en
Pages: 2174
Authors: Management Association, Information Resources
Categories: Political Science
Type: BOOK - Published: 2018-10-05 - Publisher: IGI Global

The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explor
Handbook of Mobile Data Privacy
Language: en
Pages: 403
Authors: Aris Gkoulalas-Divanis
Categories: Computers
Type: BOOK - Published: 2018-10-26 - Publisher: Springer

This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. I
Information Security Theory and Practice. Securing the Internet of Things
Language: en
Pages: 201
Authors: David Naccache
Categories: Computers
Type: BOOK - Published: 2014-07-11 - Publisher: Springer

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held i
Intelligent Security Management and Control in the IoT
Language: en
Pages: 320
Authors: Mohamed-Aymen Chalouf
Categories: Computers
Type: BOOK - Published: 2022-06-16 - Publisher: John Wiley & Sons

The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with t
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks
Language: en
Pages: 366
Authors: Massimo Ficco
Categories: Science
Type: BOOK - Published: 2017-09-29 - Publisher: Academic Press

Security and Resilience in Intelligent Data-Centric Systems and Communication Networks presents current, state-of-the-art work on novel research in theoretical
Information Security Theory and Practice
Language: en
Pages: 189
Authors: Gerhard P. Hancke
Categories: Computers
Type: BOOK - Published: 2018-06-20 - Publisher: Springer

This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, hel