This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
This monograph presents a collection of major developments leading toward the implementation of white space technology - an emerging wireless standard for using wireless spectrum in locations where it is unused by licensed users. Some of the key research areas in the field are covered. These include emerging standards, technical insights from early pilots and simulations, software defined radio…
This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health ca…
This book presents a state-of-the-art overview of the available and emerging mobile technologies and explores how these technologies can serve as support tools in enhancing user participation in health care and promoting well-being in the daily lives of individuals, thereby reducing the burden of chronic disease on the health care system. The analysis is supported by presentation of a variety o…
This book introduces inclusive-cost-effective (ICE) approaches that have the potential to transform all aspects of daily lives of people at the base of the pyramid in the economic scale, who represent more than 75% of the world population. ICE means that the approaches must meet the affordability level at the base of the pyramid. This includes mobile banking and financial service technologies, …
"Explores how the British telecom system shaped late social democracy and early neoliberalism"--OCLC-licensed vendor bibliographic record.
"A guide for business leaders to understand how to make use of data for competitive advantage"--OCLC-licensed vendor bibliographic record.
A cultural history of gigantism in architecture and digital culture, from the Eiffel Tower to the World Trade Center. The gigantic is everywhere, and gigantism is manifest in everything from excessively tall skyscrapers to globe-spanning digital networks. In this book, Henriette Steiner and Kristin Veel map and critique the trajectory of gigantism in architecture and digital culture--the conver…
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization…