01686nam0 22003131i 450 UON0027865620231205103827.55320060614d1974 |0itac50 bahinIN|||| 1||||Tirthamkara Mahavira aura unki acary paramparaNemicandra ShastriSagarSari Bharat Varshiyadigam Bara Jaina Vidvatparisad19744 v.20 cmAltri inv. 117123-125IT-UONSI SIVIIC/047 (1-4) NJAINISMOBIOGRAFIEUONC013178FISagarUONL000858SI VII CSUBCONT. INDIANO - RELIGIONE E FILOSOFIA - JAINISMOASHASTRINemicandraUONV161367692294Shri Bharat Varshiyadigam BaraUONV272035650SASTRI, NemicandrSHASTRI, NemicandraUONV161368ITSOL20240220RICAUON00278656SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI SI VII C 047 (1-4) N SI SA 117122 5 047 (1-4) N Altri inv. 117123-125SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI SI VII C 047 (2) N SI SA 117123 5 047 (2) N SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI SI VII C 047 (3) N SI SA 117124 5 047 (3) N SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI SI VII C 047 (4) N SI SA 117125 5 047 (4) N Tirthamkara Mahavira aura unki acary parampara1246450UNIOR00662nam0 22001931i 450 UON0019682920231205103237.31320030730f |0itac50 baengGB|||| ||||| Talking backB. Hooks. -HOOKSBellUONV116991464905ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00196829SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI AME VI c 2.71 0129 SI LO 47453 5 0129 BuonoTalking back205816UNIOR05186nam 22005775 450 991029934750332120200706004643.03-030-02113-010.1007/978-3-030-02113-9(CKB)4100000007127601(MiAaPQ)EBC5598678(DE-He213)978-3-030-02113-9(PPN)232471894(EXLCZ)99410000000712760120181112d2018 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierPrivacy-Enhancing Fog Computing and Its Applications /by Xiaodong Lin, Jianbing Ni, Xuemin (Sherman) Shen1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (98 pages)SpringerBriefs in Electrical and Computer Engineering,2191-81123-030-02112-2 1 Introduction -- 2 Privacy-enhancing Technologies -- 3 Identity Privacy Protection in Smart Parking Navigation -- 4 Location Privacy Protection in Mobile Crowdsensing -- 5 Data Privacy Protection in Smart Grid -- 6 Conclusions and Future Directions.This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief. .SpringerBriefs in Electrical and Computer Engineering,2191-8112Data protectionWireless communication systemsMobile communication systemsElectrical engineeringSecurityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Wireless and Mobile Communicationhttps://scigraph.springernature.com/ontologies/product-market-codes/T24100Communications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Data protection.Wireless communication systems.Mobile communication systems.Electrical engineering.Security.Wireless and Mobile Communication.Communications Engineering, Networks.005.8Lin Xiaodongauthttp://id.loc.gov/vocabulary/relators/aut881835Ni Jianbingauthttp://id.loc.gov/vocabulary/relators/autShen Xuemin (Sherman)authttp://id.loc.gov/vocabulary/relators/autBOOK9910299347503321Privacy-Enhancing Fog Computing and Its Applications1969771UNINA