This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy...
This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT...
This book constitutes the thoroughly refereed proceedings of the 15th National Software Application Conference, NASAC 2016, held in Kunming, Yunnan, in November 2016. requirements engineering, software methodologies, software analytics, software testing and evolution, and empirical studies.
This book constitutes the thoroughly refereed proceedings of the 15th National Software Application Conference, NASAC 2016, held in Kunming, Yunnan, i...