<p/><br></br><p><b> Book Synopsis </b></p></br></br><p><b>This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks</b></p> <ul> <li>Take a cooperative approach towards addressing the technology's challenges of security and privacy issues</li> <li>Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique</li> <li>Richly illustrated with detailed designs and results for all approaches used</li> <li>Introduces standardization and industry activities, and government regulation in secure vehicular networking</li> </ul><p/><br></br><p><b> From the Back Cover </b></p></br></br><p>Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures.</p> <p><i>Vehicular Ad Hoc Network Security and Privacy</i> mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats. Additional features of this book include: </p> <ul> <li>An introduction to standardization and industry activities as well as government regulation in secure vehicular networking</li> <li>Eight novel secure and privacy-preserving schemes for vehicular communications</li> <li>Explorations into interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique</li> </ul> <p>The authors have taken a non-traditional method toward securing communications, allowing for new research directions in security and privacy in VANETs, which will be helpful to students, researchers, and IT practitioners.</p><p/><br></br><p><b> About the Author </b></p></br></br><p><b>Xiaodong Lin</b> is an Associate Professor at the University of Ontario Institute of Technology in the Department of Business and Information Technology, Canada. He received his PhD in electrical and computer engineering at the University of Waterloo, Canada, and was awarded Outstanding Achievement in Graduate Studies at the PhD level. His research interests include wireless communications and network security, computer forensics, software security, and applied cryptography.</p> <b>Rongxing Lu</b> is an Assistant Professor at Nanyyang Technological University in the School of Electrical and Electronics Engineering, and an IEEE and IEEE ComSoc member. He received his PhD in Electrical and Computer Engineering at the University of Waterloo. His research interests include wireless network security, applied cryptography, and system security and data forensics.
Price Archive shows prices from various stores, lets you see history and find the cheapest. There is no actual sale on the website. For all support, inquiry and suggestion messagescommunication@pricearchive.us