This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
This monograph presents a collection of major developments leading toward the implementation of white space technology - an emerging wireless standard for using wireless spectrum in locations where it is unused by licensed users. Some of the key research areas in the field are covered. These include emerging standards, technical insights from early pilots and simulations, software defined radio…
This book compares the lessons learned from a wetland-perspective approach to the changing climate and the requirements of the Water Framework Directive (WFD) with regard to environmental conservation. Examples from Germany and Poland are discussed due to the efficiency of their respective implementations of water conservation policies. Although the general scientific interest in specific issue…
This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health ca…
This book presents a state-of-the-art overview of the available and emerging mobile technologies and explores how these technologies can serve as support tools in enhancing user participation in health care and promoting well-being in the daily lives of individuals, thereby reducing the burden of chronic disease on the health care system. The analysis is supported by presentation of a variety o…
This book introduces inclusive-cost-effective (ICE) approaches that have the potential to transform all aspects of daily lives of people at the base of the pyramid in the economic scale, who represent more than 75% of the world population. ICE means that the approaches must meet the affordability level at the base of the pyramid. This includes mobile banking and financial service technologies, …
At the crossroads of various disciplines, this collective work examines the possibility of a new end-user “engagement” in ongoing digital/technological products and services development. It provides an overview of recent research specifically focused on the user’s democratic participation and empowerment. It also enables readers to better identify the main opportunities of participatory d…
This volume provides a systematic framework for energy suppliers, policy makers, academics, students, and all others interested in energy security, and analyzes key issues concerning energy, security and sustainability with the help of a wealth of data. While sustainability is the broadest objective, energy security is an important part of it, at the global, national and societal levels. The de…
"Designing for resilience is a critical issue of the 21st century. This is the first book-length work that shows us how to design for a future that lasts, and why we should want to"--OCLC-licensed vendor bibliographic record.
"Smil presents the long history and modern infatuation with invention and innovation. Meticulous as always, these vast realms of human ingenuity are organized into sensible categories: inventions that went from welcome to undesirable, inventions that dominate and missed the mark, inventions we still dream about, and lastly, the exaggerations, myths, and wise expectations for innovations we need…