Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Authentication in IoT, Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mi


Варианты приобретения
Цена: 110830.00T
Кол-во:
 о цене
Наличие: Невозможна поставка.

в Мои желания

Автор: Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mi
Название:  Authentication in IoT
ISBN: 9781119527923
Издательство: Wiley
Классификация:


ISBN-10: 1119527929
Обложка/Формат: Hardback
Страницы: 320
Вес: 0.72 кг.
Дата издания: 13.02.2020
Серия: Engineering
Язык: English
Размер: 177 x 250 x 22
Читательская аудитория: Professional & vocational
Ключевые слова: Electronics & communications engineering
Основная тема: Electronics & communications engineering
Подзаголовок: Advances in authentication
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание:

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:

  • Offers an authoritative reference designed for use by all IoT stakeholders
  • Includes information for securing devices at the user, device, and network levels
  • Contains a classification of existing vulnerabilities
  • Written by an international group of experts on the topic
  • Provides a guide to the most current information available on IoT security

Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.



Modern Techniques for Food Authentication,

Автор: Da-Wen Sun
Название: Modern Techniques for Food Authentication,
ISBN: 0123740851 ISBN-13(EAN): 9780123740854
Издательство: Elsevier Science
Рейтинг:
Цена: 162820.00 T
Наличие на складе: Поставка под заказ.
Описание: Including coverage of various spectroscopic technologies, methods based on isotopic analysis and chromatography, DNA, enzymatic analysis, electrophoresis and thermal methods, this book provides a resource on the developments in food authentication. It offers a comprehensive overview of authentication techniques and technology.

Authentication Technologies for Cloud Technology, Iot, and Big Data

Автор: Alginahi Yasser M., Nomani Kabir Muhammad
Название: Authentication Technologies for Cloud Technology, Iot, and Big Data
ISBN: 1785615564 ISBN-13(EAN): 9781785615566
Издательство: Неизвестно
Цена: 177020.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Food Authentication: Management, Analysis and Regu lation

Автор: Georgiou
Название: Food Authentication: Management, Analysis and Regu lation
ISBN: 1118810260 ISBN-13(EAN): 9781118810262
Издательство: Wiley
Рейтинг:
Цена: 181580.00 T
Наличие на складе: Поставка под заказ.
Описание: The determination of food authenticity is a vital component of quality control. Its importance has been highlighted in recent years by high-profile cases in the global supply chain such as the European horsemeat scandal and the Chinese melamine scandal which led to six fatalities and the hospitalisation of thousands of infants.

Integrating a usable security protocol into user authentication services design process

Автор: Braz, Christina Seffah, Ahmed Naqvi, Bilal
Название: Integrating a usable security protocol into user authentication services design process
ISBN: 1138577685 ISBN-13(EAN): 9781138577688
Издательство: Taylor&Francis
Рейтинг:
Цена: 107190.00 T
Наличие на складе: Нет в наличии.
Описание: This book is about creating usable products. The techniques, taken from the worlds of human-computer interaction, marketing, and many of the social sciences, help you know who your users are, and to make security a natural outcome of the requirements and design phase of the authentication method development life cycle.

Robust Image Authentication in the Presence of Noise

Автор: Nata?a ?ivi?
Название: Robust Image Authentication in the Presence of Noise
ISBN: 3319380842 ISBN-13(EAN): 9783319380841
Издательство: Springer
Рейтинг:
Цена: 95770.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: State of the art image authentication algorithms for content based authentication.- Basic concepts.- Categories according to the feature extraction method.- The most popular algorithms for image authentication.- Authentication using watermarking.- Introduction.- Watermarking Embedding.- Watermarking Extraction.- State of the art fuzzy authentication schemes.- Elementary background and definitions.- Security analysis and adversary model.- Approximate message authentication code (AMAC).- Two provable secure fuzzy authentication schemes.- Design philosophy.- Conclusion.- Algorithms for image correction and authentication based on hard verification.- Elementary background and definitions.- Two approaches for noise tolerant authentication and correction of images.- An approach based on rotation-invariant image hashing scheme based on NMF matrix factorization.- Security of image authentication schemes.- Algorithms for image correction and authentication based on soft verification.- Soft Verification versus Hard Verification.- Soft Input Soft Verification.- Algorithms for correction and authentication of images.

Integrated Manet Mutual Authentication System

Автор: Ballah Jason T.
Название: Integrated Manet Mutual Authentication System
ISBN: 1288326505 ISBN-13(EAN): 9781288326501
Издательство: Неизвестно
Рейтинг:
Цена: 71050.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Audio- and Video-based Biometric Person Authentication

Автор: Josef Big?n; Gerard Chollet; Gunilla Borgefors
Название: Audio- and Video-based Biometric Person Authentication
ISBN: 3540626603 ISBN-13(EAN): 9783540626602
Издательство: Springer
Рейтинг:
Цена: 83850.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This text constitutes the proceedings of the First International Conference on Audio and Video-based Biometric Person Authentication, AVBPA `97, held in Switzerland, in March 1997. Topics covered include facial features localization, lip and facial motion, and audio-video features and fusion.

Cross-Media Authentication and Verification: Emerging Research and Opportunities

Автор: Anastasia Katsaounidou, Charalampos Dimoulas, Andreas Veglis
Название: Cross-Media Authentication and Verification: Emerging Research and Opportunities
ISBN: 1522555927 ISBN-13(EAN): 9781522555926
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 141370.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: As media becomes more readily available in the digital age, it also becomes more vulnerable to tampering and manipulation, making techniques for verifying reliable news and media sources essential. Understanding online technologies’ role in shaping the media environment allows for insight into the correlations between the rapidly transforming media landscape and its unwanted effect on news and content tampering.Cross-Media Authentication and Verification: Emerging Research and Opportunities is a collection of innovative research on the methods and applications of verifying the newsgathering and publishing process. While highlighting topics including human authentication, information evaluation, and tampered content, this book is ideally designed for researchers, students, publishers, and academicians seeking current research on media authenticity and misinformation.

Computational Methods in Biometric Authentication

Автор: Michael E. Schuckers
Название: Computational Methods in Biometric Authentication
ISBN: 1447125665 ISBN-13(EAN): 9781447125662
Издательство: Springer
Рейтинг:
Цена: 153720.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This unique reference offers a statistical methodology for practitioners and testers of biometric authentication systems, supplying rigorous statistical methods for evaluation which can be extended and generalized for a wide range of applications and tests.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия