|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-32899-7 |
003 |
DE-He213 |
005 |
20220116105022.0 |
007 |
cr nn 008mamaa |
008 |
160526s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319328997
|9 978-3-319-32899-7
|
024 |
7 |
|
|a 10.1007/978-3-319-32899-7
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Lu, Rongxing.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Privacy-Enhancing Aggregation Techniques for Smart Grid Communications
|h [electronic resource] /
|c by Rongxing Lu.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XVI, 177 p. 28 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Wireless Networks,
|x 2366-1445
|
505 |
0 |
|
|a Introduction -- Homomorphic Public Key Encryption Techniques -- Privacy-Preserving Multidimensional Data Aggregation -- Privacy-Preserving Subset Data Aggregation -- Privacy-Preserving Multifunctional Data Aggregation -- Privacy-Preserving Data Aggregation with Fault Tolerance -- Differentially Private Data Aggregation with Fault Tolerance -- Privacy-Preserving Data Aggregation with Data Integrity and Fault Tolerance.
|
520 |
|
|
|a This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data aggregation, multifunctional data aggregation, data aggregation with fault tolerance, data aggregation with differential privacy, and data aggregation with integrity protection. Offering a comprehensive exploration of various privacy preserving data aggregation techniques, this book is an exceptional resource for the academics, researchers, and graduate students seeking to exploit secure data aggregation techniques in smart grid communications and Internet of Things (IoT) scenarios.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319328973
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319328980
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319813936
|
830 |
|
0 |
|a Wireless Networks,
|x 2366-1445
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-32899-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|