語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and Privacy for Next-Genera...
~
Zhong, Sheng.
Security and Privacy for Next-Generation Wireless Networks
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security and Privacy for Next-Generation Wireless Networks/ by Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang.
作者:
Zhong, Sheng.
其他作者:
Zhong, Hong.
面頁冊數:
XII, 183 p. 19 illus., 14 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-3-030-01150-5
ISBN:
9783030011505
Security and Privacy for Next-Generation Wireless Networks
Zhong, Sheng.
Security and Privacy for Next-Generation Wireless Networks
[electronic resource] /by Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang. - 1st ed. 2019. - XII, 183 p. 19 illus., 14 illus. in color.online resource. - Wireless Networks,2366-1186. - Wireless Networks,.
1 Networking Cyber-Physical Systems: System Fundamentals of Security and Privacy for Next-Generation Wireless Networks -- 2 Networking Cyber-Physical Systems: Algorithm Fundamentals of Security and Privacy for Next-Generation Wireless Networks -- 3 Connecting Physical-World to Cyber-World: Security and Privacy Issues in Pervasive Sensing -- 4 Connecting Human to Cyber-World: Security and Privacy Issues in Mobile Crowdsourcing Networks -- 5 Connecting Things to Things in Physical-World: Security and Privacy Issues in Vehicular Ad-hoc Networks -- 6 Connecting Things to Things in Physical-World: Security and Privacy Issues in Mobile Sensor Networks -- 7 Connecting Human to Physical-World: Security and Privacy Issues in Mobile Crowdsensing.
This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things.
ISBN: 9783030011505
Standard No.: 10.1007/978-3-030-01150-5doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security and Privacy for Next-Generation Wireless Networks
LDR
:04258nam a22003975i 4500
001
1008334
003
DE-He213
005
20200704202225.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030011505
$9
978-3-030-01150-5
024
7
$a
10.1007/978-3-030-01150-5
$2
doi
035
$a
978-3-030-01150-5
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Zhong, Sheng.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1201864
245
1 0
$a
Security and Privacy for Next-Generation Wireless Networks
$h
[electronic resource] /
$c
by Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XII, 183 p. 19 illus., 14 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Wireless Networks,
$x
2366-1186
505
0
$a
1 Networking Cyber-Physical Systems: System Fundamentals of Security and Privacy for Next-Generation Wireless Networks -- 2 Networking Cyber-Physical Systems: Algorithm Fundamentals of Security and Privacy for Next-Generation Wireless Networks -- 3 Connecting Physical-World to Cyber-World: Security and Privacy Issues in Pervasive Sensing -- 4 Connecting Human to Cyber-World: Security and Privacy Issues in Mobile Crowdsourcing Networks -- 5 Connecting Things to Things in Physical-World: Security and Privacy Issues in Vehicular Ad-hoc Networks -- 6 Connecting Things to Things in Physical-World: Security and Privacy Issues in Mobile Sensor Networks -- 7 Connecting Human to Physical-World: Security and Privacy Issues in Mobile Crowdsensing.
520
$a
This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things.
650
0
$a
Data protection.
$3
557764
650
0
$a
Wireless communication systems.
$3
562740
650
0
$a
Mobile communication systems.
$3
562917
650
0
$a
Electrical engineering.
$3
596380
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Wireless and Mobile Communication.
$3
1207058
650
2 4
$a
Communications Engineering, Networks.
$3
669809
700
1
$a
Zhong, Hong.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1302145
700
1
$a
Huang, Xinyi.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1076441
700
1
$a
Yang, Panlong.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1302146
700
1
$a
Shi, Jin.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1302147
700
1
$a
Xie, Lei.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1059604
700
1
$a
Wang, Kun.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1192599
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030011499
776
0 8
$i
Printed edition:
$z
9783030011512
830
0
$a
Wireless Networks,
$x
2366-1186
$3
1258208
856
4 0
$u
https://doi.org/10.1007/978-3-030-01150-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入