This book studies data and knowledge transactions in mobile environments. A range of classical notions and protocols of transaction processing are rechecked and redefined in mobile environments. A relaxed serializability and a concurrency control method for mobile transactions are investigated. In addition to data transaction, knowledge transaction is explored in mobile environments. This book presents a knowledge transaction language and a model for use in mobile computing environments, and formalizes a framework/model that can be used to study knowledge transaction in mobile logic...
This book studies data and knowledge transactions in mobile environments. A range of classical notions and protocols of transaction processing are rec...
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and...
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN...
Cyber Physical Systems: Architectures, Protocols and Applications helps you understand the basic principles and key supporting standards of CPS. It analyzes different CPS applications from the bottom up, extracting the common characters that form a vertical structure. It presents mobile sensing platforms and their applications toward interrelated paradigms, highlighting and briefly discussing different types of mobile sensing platforms and the functionalities they offer. It then looks at the naming, addressing, and profile services of CPS and proposes a middleware...
Cyber Physical Systems: Architectures, Protocols and Applications helps you understand the basic principles and key supporting sta...
Managing Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices ranging from technicality of systems evolution to managerial aspects of the topic. It includes very contemporary issues such as evolving legacy systems to e-business, applying patterns for reengineering legacy systems to web, architectural recovery of legacy systems, evolving legacy systems into software components. The book offers insight on how information systems evolution and maintenance could be initiated, managed, and engineered. The book is a...
Managing Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices rangi...
Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels.
Written by pioneering researchers, Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent...
Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless ne...
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware...
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardwa...