000 | 03387nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-981-10-3235-6 | ||
003 | DE-He213 | ||
005 | 20220801222451.0 | ||
007 | cr nn 008mamaa | ||
008 | 170223s2017 si | s |||| 0|eng d | ||
020 |
_a9789811032356 _9978-981-10-3235-6 |
||
024 | 7 |
_a10.1007/978-981-10-3235-6 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aZhu, Liehuang. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _961652 |
|
245 | 1 | 0 |
_aSecure and Privacy-Preserving Data Communication in Internet of Things _h[electronic resource] / _cby Liehuang Zhu, Zijian Zhang, Chang Xu. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2017. |
|
300 |
_aVII, 78 p. 22 illus., 10 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Signal Processing, _x2196-4084 |
|
505 | 0 | _aIntroduction -- Secure Data Aggregation in Wireless Sensor Network -- Privacy preserving Meter Reading Transmission in Smart Grid -- Key Agreement and Management in Vehicular Ad-hoc Network -- Conclusion. | |
520 | _aThis book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book. | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
700 | 1 |
_aZhang, Zijian. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _961653 |
|
700 | 1 |
_aXu, Chang. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _961654 |
|
710 | 2 |
_aSpringerLink (Online service) _961655 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811032349 |
776 | 0 | 8 |
_iPrinted edition: _z9789811032363 |
830 | 0 |
_aSpringerBriefs in Signal Processing, _x2196-4084 _961656 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-10-3235-6 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c80800 _d80800 |