Security and privacy in internet of things (IoTs) models, algorithms, and implementations
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authe...
Saved in:
| Other Authors: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press, Taylor & Francis Group
2016
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. |
|---|---|
| Physical Description: | xx, 584 pages illustrations 24 cm. |
| Bibliography: | Includes bibliographical references and index. |
| ISBN: | 9781498723183 (hardback) 1498723187 (hardback) |


