Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...

Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

RFID Toys: Cool Projects for Home, Office and Entertainment (ExtremeTech)
RFID Toys: Cool Projects for Home, Office and Entertainment (ExtremeTech)

Radio frequency identification now belongs to the masses, and it lets you control all sorts of things. Like access to your front door. Or valuables in an RFID-enabled safe. You can corral your stuff within an RFID-monitored perimeter, or build a shelf that tells you when you're out of hot sauce. This book shows you how, with step-by-step...

RFID in Manufacturing
RFID in Manufacturing
Information systems for manufacturing often follow a three-layer architecture based on an enterprise resource planning (ERP) layer (for order planning), a manufacturing execution system (MES) layer (for factory control), and a shop floor layer (for machine control). Future requirements on flexibility and adaptability require a much closer...
Voice Over IP Crash Course
Voice Over IP Crash Course
Recent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability. Voice Over IP Crash Course offers practical technology coverage, while discussing the business, strategic and competitive implications of VoIP deployment in corporations. The book also...
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

RFID Systems: Research Trends and Challenges
RFID Systems: Research Trends and Challenges

This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems

In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...

Inkjet Technology for Digital Fabrication
Inkjet Technology for Digital Fabrication

Whilst inkjet technology is well-established on home and small office desktops and is now having increasing impact in commercial printing, it can also be used to deposit materials other than ink as individual droplets at a microscopic scale. This allows metals, ceramics, polymers and biological materials (including living cells) to be...

Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
The book consists of a collection of works on utilising the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID...
RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
"Thought-provoking and far-sighted, this book provides a detailed analysis of the legal issues involved in on-line business and how a new generation of electronic agents can help. If you’re grappling with these issues today—or if you just want to see what’s coming tomorrow—this book is an excellent place to...
Intelligent Multimedia Surveillance: Current Trends and Research
Intelligent Multimedia Surveillance: Current Trends and Research

Intelligent multimedia surveillance concerns the analysis of multiple sensing inputs including video and audio streams, radio-frequency identification (RFID), and depth data. These data are processed for the automated detection and tracking of people, vehicles, and other objects. The goal is to locate moving targets, to understand their...

Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy