This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing, UbiComp 2007. It covers all current issues in ubiquitous, pervasive and handheld computing systems and their applications, including tools and techniques for designing, implementing, and evaluating ubiquitous computing systems; mobile, wireless, and ad hoc networking infrastructures for ubiquitous computing; privacy, security, and trust in ubiquitous and pervasive systems.
Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmental monitoring or inter-vehicle communications: there is almost nothing left that is not going to be smart and networked. While a great amount of research has been devoted to the pure networking aspects, ad hoc and sensor networks will not be successfully deployed if security, dependability, and privacy issues are not addressed adequately. As the first book devoted to the topic, this volume constitutes the thoroughly refereed post-proceedings of the First European Workshop on Security in Ad-hoc and Sensor Networks, ESAS, 2004, held in Heidelberg, Germany in August 2004. The 17 revised full papers were carefully reviewed and selected from 55 submissions. Among the key topics addressed are key distribution and management, authentication, energy-aware cryptographic primitives, anonymity and pseudonymity, secure diffusion, secure peer-to-peer overlays, and RFIDs.
This book comprises the proceedings of the Encryptcon International Research Conference on Cybersecurity, held at the Indian Institute of Technology Madras, hosted by Team Shaastra. The conference took place on January 6th and 7th, 2024.
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in computer science and electrical engineering.
This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India during 3–4 October 2020. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.
Ad Hoc Wireless Networking is the next big thing in communication. This volume reveals the state-of-the-art of ad hoc wireless networking in addition to giving the fundamentals of routing protocols. It covers the topics of security, TCP performance over wireless links, power conservation, location discovery, scalability, proactivity, routing protocols, computational geometry, and more. The 15 self-contained chapters are authored by experts in wireless networking and mobile computing. Audience: Both specialists and uninformed readers will find this volume stimulating and helpful.
This book describes new energy saving methods and technologies for heat power engineering. The book is devoted to topical issues of energy and related industries. Leading Ukrainian scientists from both scientific institutes and educational universities took part in its creation. The research results are presented in 6 parts: electrical engineering, heat power engineering, nuclear power engineering, fossil fuels, cybersecurity and computer science, environmental safety. Results of regulating of operating modes and applicability of model checking technique in power systems are showed. Separate block of questions regarding the functioning of nuclear power plants, their waste and preventive measures of protection against negative effects on living organisms (including, for example, the Chernobyl nuclear power plant) is considered. The results of the peculiarities of the extraction, purification and use of fossil fuels are presented. In some chapters, presented the results on improving the cybersecurity of energy systems and its resilience to various threats, including the use of 5G technology. Traditionally for this series, issues of ecological safety, the impact of different energy systems on the environment and its protection are considered. A book is for researchers, engineers, as well as lecturers and postgraduates of higher education institutions dealing with energy sector, power systems, ecological safety, etc.
SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things: Discusses a broad range of IoT attacks and defense mechanisms Examines IoT security and privacy protocols and approaches Covers both the logical and physical security of IoT devices Addresses IoT security through network traffic modeling Describes privacy preserving techniques in smart cities Explores current threat and vulnerability analyses Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.
This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021. The 18 full papers and 9 short paper presented in this book were carefully reviewed and selected from 62 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design. Chapters “A Quantile-based Watermarking Approach for Distortion Minimization”, “Choosing Wordlists for Password Guessing: An Adaptive Multi-Armed Bandit Approach” and “A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.