This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
This monograph presents a collection of major developments leading toward the implementation of white space technology - an emerging wireless standard for using wireless spectrum in locations where it is unused by licensed users. Some of the key research areas in the field are covered. These include emerging standards, technical insights from early pilots and simulations, software defined radio…
This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health ca…
This book presents a state-of-the-art overview of the available and emerging mobile technologies and explores how these technologies can serve as support tools in enhancing user participation in health care and promoting well-being in the daily lives of individuals, thereby reducing the burden of chronic disease on the health care system. The analysis is supported by presentation of a variety o…
This book introduces inclusive-cost-effective (ICE) approaches that have the potential to transform all aspects of daily lives of people at the base of the pyramid in the economic scale, who represent more than 75% of the world population. ICE means that the approaches must meet the affordability level at the base of the pyramid. This includes mobile banking and financial service technologies, …
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization…
This book introduces context-aware computing, providing definitions, categories, characteristics, and context awareness itself and discussing its applications with a particular focus on smart learning environments. It also examines the elements of a context-aware system, including acquisition, modelling, reasoning, and distribution of context. It also reviews applications of context-aware compu…
This book offers an accessible introduction and practical guide to Voice over Internet Protocol (VoIP) technology, providing readers with the know-how to solve the problems encountered in applying VoIP technology across all types of network. It incorporates the latest research findings and brings readers up to date with the challenges that are faced by researchers developing novel applications …
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are gro…