Search results for ""Author Athanasios V. Vasilakos""
Taylor & Francis Inc Vehicular Social Networks
Book SynopsisThe book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.Table of Contents Introduction to VSNs Kardelen Cepni, Mustafa Ozger, and Ozgur B. Akan, "Vehicular Social Sensor Networks" Flavio Esposito, "Architectures for Social Vehicular Network Programmability" Data Dissemination in VSNs Leandros A. Maglaras, Pavlos Basaras, Dimitrios Katsaros, and Helge Janicke, "Social Clustering of Vehicles" Mahmoud Hashem Eiza and Qi Shi, "Social Evolving Graph-Based Connectivity Model for Vehicular Social Networks" Felipe D. da Cunha, Guilherme Maia, Leandro Villas, Aline Carneiro Viana, Raquel Mini, and Antonio A. F. Loureiro, "Socially Inspired Dissemination in VSNs" Applications and Security in VSNs Syed Fakhar Abbas, William Liu, Quan Bai, Adnan Al-Anbuky and Aminu Bello Usman, "Revealing the Role of Structural Transitivity in Building the Sustainable Community-Aware Vehicular Social Networks" Elif Bozkaya and Berk Canberk, "Crowdsourcing Applications for Vehicular Social Networks" 8 Farzad Safaei, "Efficacy of ridesharing as the basis for a dependable public transport system for Vehicular Social Networks" 9 Hongyu Jin, Mohammad Khodaei, and Panos Papadimitratos, "Security and Privacy in Vehicular Social Networks"
£166.25
Taylor & Francis Inc Introduction to Certificateless Cryptography
Book SynopsisAs an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand. Table of ContentsSetting the Stage. Avoiding key escrow Mathematical concepts and properties. CL-PKC without Random Oracles. Concrete constructions of CLE Generic construction of CLE. CLS secure in the standard model. CL-PKC in the Random Oracle Models. The random oracle model. CLE, CLS and CL-AKE secure in the random oracle model. CL-PKC without parings. Applications, Extensions and Related Primitives. Applications of CL-PKC. Extensions of CL-PKC. Comparisons between CL-PKC and SGC-PKC, Certificate-based PKC. Future Directions. Perspectives.
£80.74