Doprava zadarmo s Packetou nad 59.99 €
Pošta 4.49 SPS 4.99 Kuriér GLS 3.99 Zberné miesto GLS 2.99 Packeta kurýr 4.99 Packeta 2.99 SPS Parcel Shop 2.99

Location Privacy Protection in Mobile Networks

Jazyk AngličtinaAngličtina
Kniha Brožovaná
Kniha Location Privacy Protection in Mobile Networks Xinxin Liu
Libristo kód: 02016554
Nakladateľstvo Springer, Berlin, október 2013
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environment... Celý popis
? points 154 b
61.28
Skladom u dodávateľa v malom množstve Odosielame za 13-16 dní

30 dní na vrátenie tovaru


Mohlo by vás tiež zaujímať


Papers of Thomas Jefferson, Volume 7 Thomas Jefferson / Pevná
common.buy 205.39
Imperial Tragedy / Brožovaná
common.buy 15.09
kleine Hauser-Orakel der Kipperkarten Zeljko Schreiner / Brožovaná
common.buy 18.21
Mich kriegt ihr nicht! Steffan Heuer / Brožovaná
common.buy 19.11
Potentiale der Angehörigenarbeit Matthias Kramer / Brožovaná
common.buy 40.35
PRIPRAVUJEME
Hortus Kewensis 3 Volume Set William Aiton / Brožovaná
common.buy 115.72
Comparative Hepatitis Olaf Weber / Pevná
common.buy 162.32
Der Beschriebene Tannling Adalbert Stifter / Pevná
common.buy 53.53
Interstellar Processes D.J. Hollenbach / Pevná
common.buy 358.96
50 More Dinners in a Dash Tessa Harvard Taylor / Brožovaná
common.buy 17.40
PRIPRAVUJEME
Pharmaceutical, Biological and Chemical Patents Maximilian Haedicke & Marco Stief & Dirk Buhler / Pevná
common.buy 277.24
Structure and Mechanisms Francis A. Carey / Brožovaná
common.buy 89.66
Beyond the Internet / Pevná
common.buy 211.13
Roter Regen Cees Nooteboom / Brožovaná
common.buy 8.44
Neue digitale Kultur- und Bildungsraume Petra Grell / Brožovaná
common.buy 42.56

This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. §This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.

Darujte túto knihu ešte dnes
Je to jednoduché
1 Pridajte knihu do košíka a vyberte možnosť doručiť ako darček 2 Obratom Vám zašleme poukaz 3 Knihu zašleme na adresu obdarovaného

Prihlásenie

Prihláste sa k svojmu účtu. Ešte nemáte Libristo účet? Vytvorte si ho teraz!

 
povinné
povinné

Nemáte účet? Získajte výhody Libristo účtu!

Vďaka Libristo účtu budete mať všetko pod kontrolou.

Vytvoriť Libristo účet