Communications category: 4698 books

Cover of Wireless and Satellite Systems

Wireless and Satellite Systems

9th International Conference, WiSATS 2017, Oxford, UK, September 14-15, 2017, Proceedings

by
Language: English
Release Date: March 7, 2018

This book constitutes the proceedings of the 9th International Conference on Wireless and Satellite Services, WiSATS 2017, held in Oxford, UK, in September 2017. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite...
Cover of Dynamic Secrets in Communication Security
by Sheng Xiao, Weibo Gong, Don Towsley
Language: English
Release Date: August 13, 2013

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting...
Cover of Physical-Layer Security for Cooperative Relay Networks
by Yulong Zou, Jia Zhu
Language: English
Release Date: April 20, 2016

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic...
Cover of Frontier Computing

Frontier Computing

Theory, Technologies and Applications (FC 2017)

by
Language: English
Release Date: April 18, 2018

This book gathers the proceedings of the 6th International Conference on Frontier Computing, held in Osaka, Japan on July 12–14, 2017, and provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. It addresses a number of broad themes,...
Cover of Quantum Attacks on Public-Key Cryptosystems
by Song Y. Yan
Language: English
Release Date: July 8, 2014

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on...
Cover of Broadband Wireless Access Networks for 4G

Broadband Wireless Access Networks for 4G

Theory, Application, and Experimentation

by
Language: English
Release Date: December 31, 2013

With the increased functionality demand for mobile speed and access in our everyday lives, broadband wireless networks have emerged as the solution in providing high data rate communications systems to meet these growing needs. Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation...
Cover of Next Generation Data Communication Technologies
by
Language: English
Release Date: December 31, 2011

Data sharing is central to the existence of any computer network. Research on the types of networks used to transmit data, as well as the nature of the data itself, is essential for computer engineers and information technology professionals. Next Generation Data Communication Technologies: Emerging...
Cover of Information Hiding in Speech Signals for Secure Communication
by Zhijun Wu
Language: English
Release Date: August 27, 2014

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret...
Cover of Code Breaking in the Pacific
by Peter Donovan, John Mack
Language: English
Release Date: August 14, 2014

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25)...
Cover of Wireless Rechargeable Sensor Networks
by Yuanyuan Yang, Cong Wang
Language: English
Release Date: April 20, 2015

This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from...
Cover of Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction
by
Language: English
Release Date: February 9, 2018

As the world becomes digitalized, developing countries are starting to see an increase in technological advancements being integrated into their society. These advancements are creating opportunities to improve both the economy and the lives of people within these areas. Affordability Issues Surrounding...
Cover of Tablet PC Telephone
by Robert Stetson
Language: English
Release Date: November 9, 2013

When your Tablet PC manufacturer indicates in the specification that the device is not capable of supporting cell phone connectivity, you probably dismissed using it for making phone calls.You can save on your cell phone minutes by using your Tablet PC even if the Tablet does not support cell phone...
Cover of Programmatic Integration of Cyber into the Institutional Domain of Leader Development: Cyberspace and Computer Curriculum in Army Learning Institutions, Comparing Cyber to Armor or Aviation
by Progressive Management
Language: English
Release Date: May 12, 2018

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This study assesses the institutional domain of leader development in relation to cyberspace education and the implications of poorly integrating cyberspace into leader development....
Cover of Data Breach Preparation and Response

Data Breach Preparation and Response

Breaches are Certain, Impact is Not

by Kevvie Fowler
Language: English
Release Date: June 8, 2016

Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry...
First 14 15 16 17 18 19 2021 22 23 24 25 26 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy