Hardcover. Zustand: Fine. Grade 4 out of 5 points. This is a used book. Book may have wear due to handling. Has no markings on pages. May not include extra materials like access codes, CDs, accessories, etc. All orders ship by next business day! We are a small company and very thankful for your business!
Hardcover. Zustand: New.
Zustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 55,71
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Doctoral Thesis / Dissertation from the year 2017 in the subject Electrotechnology, grade: PhD, , course: Doctor of Philosophy, language: English, abstract: Wireless Sensor Networks (WSNs) is fast emerging as prominent study area that attracting considerable research attention globally. The field has seen tremendous development in design and development of application related interfaces with sensor networks. Sensor network finds applications in several domains such as medical, military, home networks, space and so on. Many researchers strongly believe that WSNs can become as important as the internet in the near future. Just as the internet allows access to digital information anywhere, WSNs could easily provide remote interaction with the physical world. It is going to be the backbone of Ubiquitous Computing (UBICOMP).Through local collaboration among sensors, elimination of duplicate data, participation of relevant nodes in the given task etc. can produce a significant difference in energy conservation, thereby increasing the life time of the sensor network.As the number of nodes increases, data security becomes the most challenging part of the network. The intruders can hack the data any time during processing, transmission or at the receiver end. So, as a popular approach data encryption is the most commendable approach in today's network. Asymmetric key encryption consumes more energy in processing and so not recommended for WSNs. Symmetric key encryption gives better performance with respect to asymmetric key encryption in WSN applications. It uses less computational power due to relatively effortless mathematical operations, and eventually spends less power. This thesis also proposes a symmetric data encryption through Tabulation method of Boolean function reductionfor the WSNs for secure data transmission. It also suggests a new secure approach, SEEMd, Security Enabled Energy Efficient Middleware algorithmfor the critical data sensing and gives a second chance to the nodes before it falls into to sleep mode for energy management.WSNs are designed for applications which range from small-size healthcare surveillance systems to large-scale agricultural monitoring or environmental monitoring. Thus, any WSN deployment, data aggregation, processing and communication have to assure minimum Quality of Service (QoS) in the network from application to application. In this circumstances, the proposed algorithms in this thesis proved to be efficient and reliable in energy saving and life time enhancement.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Certain Power Management Algorithms for Wireless Sensor Networks by Energy Efficient Data Transmission, Security and Node Deployment | Linoy A Tharakan | Taschenbuch | 140 S. | Englisch | 2018 | GRIN Verlag | EAN 9783668635258 | Verantwortliche Person für die EU: GRIN Publishing GmbH, Waltherstr. 23, 80337 München, info[at]grin[dot]com | Anbieter: preigu.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. IEEE 802.11 WIRELESS NETWORKS | BASIC CONCEPTS, MOBILITY MANAGEMENT AND SECURITY ENHANCEMENTS | Issac Biju | Taschenbuch | Einband - flex.(Paperback) | Englisch | 2009 | VDM Verlag Dr. Müller | EAN 9783639186086 | Verantwortliche Person für die EU: OmniScriptum GmbH & Co. KG, Bahnhofstr. 28, 66111 Saarbrücken, info[at]akademikerverlag[dot]de | Anbieter: preigu.
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
EUR 120,22
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Like New. Like New. book.
Sprache: Englisch
Verlag: Springer Nature Switzerland AG Jun 2026, 2026
ISBN 10: 3032222079 ISBN 13: 9783032222077
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the proceedings of the 24th International Conference on Security and Management, SAM 2025, the 24th International Conference on Wireless Networks, ICWN 2025, and the 23rd International Conference on Software Engineering Research and Practice, SERP 2025. They were held as part of the 2025 World Congress in Computer Science, Computer Engineering, and Applied Computing, CSCE 2025, which took place in Las Vegas, NV, USA, during July 21-24, 2025.The SAM 2025 Conference received a total of 186 submissions, of which 38 papers were accepted. The ICWN 2025 Conference received 33 submissions, of which 8 papers were accepted. The SERP 2025 Conference received 49 submissions, of which 8 papers were accepted. This volume includes 37 of the accepted papers from SAM 2025, ICWN 2025, and SERP 2025.The papers were organized in topical sections as follows: Cybersecurity - Defensive and Offensive Strategies, and Related Issues; Privacy Preserving, Authentication, and Blockchain Methods and Applications; Security Management, Communication Infrastructures, and Applications; 24th International Conference on Wireless Networks, ICWN 2025; 23rd International Conference on Software Engineering Research and Practice, SERP 2025; and Poster Research Papers.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Security and Management and Wireless Networks | 23rd International Conference, SAM 2024 and 23rd International Conference, ICWN 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22-25, 2024, Revis | Kevin Daimi (u. a.) | Taschenbuch | Communications in Computer and Information Science | xix | Englisch | 2025 | Springer | EAN 9783031866364 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Sprache: Englisch
Verlag: Springer-Nature New York Inc, 2025
ISBN 10: 3031866363 ISBN 13: 9783031866364
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 158,05
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 665 pages. 9.25x6.10x9.21 inches. In Stock.
Zustand: New. Satisfaction Guaranteed or your money back.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the proceedings of the 23rd International Conference on Security and Management, SAM 2024, and the 23rd International Conference on Wireless Networks, ICWN 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024.For SAM 2024, 255 submissions have been received and 40 papers have been accepted for publication in these proceedings; the 12 papers included from IWCN 2024 have been carefully reviewed and selected from 66 submissions. They have been organized in topical sections as follows: Intrusion and attack detection: malware, malicious URL, phishing; security assessment and management + blockchain + use of artificial intelligence; cybersecurity and communications systems + cryptography and privacy; security and management + new methodologies and applications; wireless networks and mobile computing.
Zustand: New. pp. xiv + 618.
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
EUR 271,39
Anzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Sprache: Chinesisch
Verlag: Electronics Industry Publishing House Pub. Date :2, 2000
ISBN 10: 712106961X ISBN 13: 9787121069611
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Paperback. Publisher: Electronic Industry Publishing House Pub. Date :2008-07- 01. This book consists of three parts. the system introduces a wireless network and mobile communications in resource management. mobile management and security management. focused on the 802.1Ix.
Anbieter: PBShop.store US, Wood Dale, IL, USA
PAP. Zustand: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 57,65
Anzahl: Mehr als 20 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Doctoral Thesis / Dissertation from the year 2017 in the subject Electrotechnology, grade: PhD, , course: Doctor of Philosophy, language: English, abstract: Wireless Sensor Networks (WSNs) is fast emerging as prominent study area that attracting considerable research attention globally. The field has seen tremendous development in design and development of application related interfaces with sensor networks. Sensor network finds applications in several domains such as medical, military, home networks, space and so on. Many researchers strongly believe that WSNs can become as important as the internet in the near future. Just as the internet allows access to digital information anywhere, WSNs could easily provide remote interaction with the physical world. It is going to be the backbone of Ubiquitous Computing (UBICOMP).Through local collaboration among sensors, elimination of duplicate data, participation of relevant nodes in the given task etc. can produce a significant difference in energy conservation, thereby increasing the life time of the sensor network.As the number of nodes increases, data security becomes the most challenging part of the network. The intruders can hack the data any time during processing, transmission or at the receiver end. So, as a popular approach data encryption is the most commendable approach in today's network. Asymmetric key encryption consumes more energy in processing and so not recommended for WSNs. Symmetric key encryption gives better performance with respect to asymmetric key encryption in WSN applications. It uses less computational power due to relatively effortless mathematical operations, and eventually spends less power. This thesis also proposes a symmetric data encryption through Tabulation method of Boolean function reductionfor the WSNs for secure data transmission. It also suggests a new secure approach, SEEMd, Security Enabled Energy Efficient Middleware algorithmfor the critical data sensing and gives a second chance to the nodes before it falls into to sleep mode for energy management.WSNs are designed for applications which range from small-size healthcare surveillance systems to large-scale agricultural monitoring or environmental monitoring. Thus, any WSN deployment, data aggregation, processing and communication have to assure minimum Quality of Service (QoS) in the network from application to application. In this circumstances, the proposed algorithms in this thesis proved to be efficient and reliable in energy saving and life time enhancement. 140 pp. Englisch.
Anbieter: Brook Bookstore On Demand, Napoli, NA, Italien
EUR 86,24
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: new. Questo è un articolo print on demand.
Sprache: Englisch
Verlag: Createspace Independent Publishing Platform, 2017
ISBN 10: 1978108621 ISBN 13: 9781978108622
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
EUR 90,86
Anzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback / softback. Zustand: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Sprache: Englisch
Verlag: GRIN Verlag, GRIN Verlag Feb 2018, 2018
ISBN 10: 3668635250 ISBN 13: 9783668635258
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Doctoral Thesis / Dissertation from the year 2017 in the subject Electrotechnology, grade: PhD, , course: Doctor of Philosophy, language: English, abstract: Wireless Sensor Networks (WSNs) is fast emerging as prominent study area that attracting considerable research attention globally. The field has seen tremendous development in design and development of application related interfaces with sensor networks. Sensor network finds applications in several domains such as medical, military, home networks, space and so on. Many researchers strongly believe that WSNs can become as important as the internet in the near future. Just as the internet allows access to digital information anywhere, WSNs could easily provide remote interaction with the physical world. It is going to be the backbone of Ubiquitous Computing (UBICOMP).Through local collaboration among sensors, elimination of duplicate data, participation of relevant nodes in the given task etc. can produce a significant difference in energy conservation, thereby increasing the life time of the sensor network.As the number of nodes increases, data security becomes the most challenging part of the network. The intruders can hack the data any time during processing, transmission or at the receiver end. So, as a popular approach data encryption is the most commendable approach in today¿s network. Asymmetric key encryption consumes more energy in processing and so not recommended for WSNs. Symmetric key encryption gives better performance with respect to asymmetric key encryption in WSN applications. It uses less computational power due to relatively effortless mathematical operations, and eventually spends less power. This thesis also proposes a symmetric data encryption through Tabulation method of Boolean function reductionfor the WSNs for secure data transmission. It also suggests a new secure approach, SEEMd, Security Enabled Energy Efficient Middleware algorithmfor the critical data sensing and gives a second chance to the nodes before it falls into to sleep mode for energy management.WSNs are designed for applications which range from small-size healthcare surveillance systems to large-scale agricultural monitoring or environmental monitoring. Thus, any WSN deployment, data aggregation, processing and communication have to assure minimum Quality of Service (QoS) in the network from application to application. In this circumstances, the proposed algorithms in this thesis proved to be efficient and reliable in energy saving and life time enhancement.Books on Demand GmbH, Überseering 33, 22297 Hamburg 140 pp. Englisch.
Sprache: Englisch
Verlag: Createspace Independent Publishing Platform, 2017
ISBN 10: 1978108621 ISBN 13: 9781978108622
Anbieter: CitiRetail, Stevenage, Vereinigtes Königreich
EUR 73,19
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: new. Paperback. Routing in wireless sensor, mobile ad-hoc, and vehicular networks is a crucial operation having signicantly attracted scientists' attention during the past years. Opportunistic routing, however, is a novel and promising approach, which is still an ongoing research paradigm. The purpose of opportunistic routing protocols is to increase the reliability of delivering data packets to their destination by utilizing the broadcast nature of wireless networks and selecting a set of nodes, instead of only one, as potential next-hop candidates. Apart from the reliability, security and trustworthiness of communications is also a challenging task. More specically, almost all traditional and opportunistic routing protocols require cooperation of all network nodes to complete the routing process. However, some nodes in the network may be compromised and avoid collaboration with others due to various selsh or malicious motivations. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The two compelling and relevant concepts with wireless networks are seamless mobility and security. Ubiquitous computing is becoming part of human life with the advent of wireless devices and technologies. Of all the wireless networks, IEEE 802.11 networks are getting increasingly popular. The whole idea of mobility and seamless communication in 802.11 infrastructure network can be a near reality, if we were to come up with a mobility management architecture that would help such seamless mobile node movement between access points. One possible mobility management architecture can contain mobility prediction block, delay management block and resource management block as outlined in this book. As it is very well known, security attacks can be a problem with wireless networks, especially with the use of spoofing attacks. One way to minimize these attacks is to secure some of the related protocols without dragging down the performance. This book can thus help anyone to understand some aspects of the mobility and security issues in 802.11 wireless networks.
Sprache: Englisch
Verlag: Springer, Springer Apr 2025, 2025
ISBN 10: 3031866363 ISBN 13: 9783031866364
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the proceedings of the 23rd International Conference on Security and Management, SAM 2024, and the 23rd International Conference on Wireless Networks, ICWN 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024.For SAM 2024, 255 submissions have been received and 40 papers have been accepted for publication in these proceedings; the 12 papers included from IWCN 2024 have been carefully reviewed and selected from 66 submissions. They have been organized in topical sections as follows: Intrusion and attack detection: malware, malicious URL, phishing; security assessment and management + blockchain + use of artificial intelligence; cybersecurity and communications systems + cryptography and privacy; security and management + new methodologies and applications; wireless networks and mobile computing. 668 pp. Englisch.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 137,26
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. Print on Demand.
Anbieter: moluna, Greven, Deutschland
EUR 92,27
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt.
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND.