Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference.
Bemærk: Kan ikke leveres før jul.
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked... Læs mere
Bemærk: Kan ikke leveres før jul.
This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains.
Bemærk: Kan ikke leveres før jul.
This book gathers selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, held at Brunel University, London, on February 27–28, 2019.
Bemærk: Kan ikke leveres før jul.
This book explores recent advances in blockchain technology and its impact on Industry 4.0 via advanced technologies.
Bemærk: Kan ikke leveres før jul.
This book presents a compilation of selected papers from the Fourth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in August 2019 in Guiyang, China.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughly refereed post conference papers of the... Læs mere
Bemærk: Kan ikke leveres før jul.
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust.
Bemærk: Kan ikke leveres før jul.
This book gathers papers presented at the 9th International Conference on Computer Engineering and Networks (CENet2019), held in Changsha, China, on October 18–20, 2019.
Bemærk: Kan ikke leveres før jul.
This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis.
Bemærk: Kan ikke leveres før jul.
This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication.