top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Gender, modernity and male migrant workers in China : becoming a 'modern' man / / Xiaodong Lin
Gender, modernity and male migrant workers in China : becoming a 'modern' man / / Xiaodong Lin
Autore Lin Xiaodong
Pubbl/distr/stampa Abingdon, Oxon : , : Routledge, , 2013
Descrizione fisica 1 online resource (164 p.)
Disciplina 331.5/610951
Collana Routledge contemporary china series
Soggetto topico Rural-urban migration - China - History
Migration, Internal - China - History
Male employees - China - History
Masculinity - China
Men - China
Soggetto genere / forma Electronic books.
ISBN 0-203-59090-2
1-299-46964-7
1-135-06974-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Half Title; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Preface; Acknowledgements; Glossary; 1 Introduction; 2 Representing 'peasant workers'; 3 Leaving home and being a 'filial son'; 4 'Father-son' relations and/or becoming urban working-class; 5 Conclusion: Becoming a 'modern' man; 6 Postscript: Youth, aspirations and masculinities; Appendix: Research participants; Notes; Bibliography; Index
Record Nr. UNINA-9910452704403321
Lin Xiaodong  
Abingdon, Oxon : , : Routledge, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Gender, modernity and male migrant workers in China : becoming a 'modern' man / / Xiaodong Lin
Gender, modernity and male migrant workers in China : becoming a 'modern' man / / Xiaodong Lin
Autore Lin Xiaodong
Pubbl/distr/stampa Abingdon, Oxon : , : Routledge, , 2013
Descrizione fisica 1 online resource (164 p.)
Disciplina 331.5/610951
Collana Routledge contemporary china series
Soggetto topico Rural-urban migration - China - History
Migration, Internal - China - History
Male employees - China - History
Masculinity - China
Men - China
ISBN 1-135-06973-5
0-203-59090-2
1-299-46964-7
1-135-06974-3
Classificazione SOC008000SOC018000SOC032000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Half Title; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Preface; Acknowledgements; Glossary; 1 Introduction; 2 Representing 'peasant workers'; 3 Leaving home and being a 'filial son'; 4 'Father-son' relations and/or becoming urban working-class; 5 Conclusion: Becoming a 'modern' man; 6 Postscript: Youth, aspirations and masculinities; Appendix: Research participants; Notes; Bibliography; Index
Record Nr. UNINA-9910779561003321
Lin Xiaodong  
Abingdon, Oxon : , : Routledge, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Gender, modernity and male migrant workers in China : becoming a 'modern' man / / Xiaodong Lin
Gender, modernity and male migrant workers in China : becoming a 'modern' man / / Xiaodong Lin
Autore Lin Xiaodong
Pubbl/distr/stampa Abingdon, Oxon : , : Routledge, , 2013
Descrizione fisica 1 online resource (164 p.)
Disciplina 331.5/610951
Collana Routledge contemporary china series
Soggetto topico Rural-urban migration - China - History
Migration, Internal - China - History
Male employees - China - History
Masculinity - China
Men - China
ISBN 1-135-06973-5
0-203-59090-2
1-299-46964-7
1-135-06974-3
Classificazione SOC008000SOC018000SOC032000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Half Title; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Preface; Acknowledgements; Glossary; 1 Introduction; 2 Representing 'peasant workers'; 3 Leaving home and being a 'filial son'; 4 'Father-son' relations and/or becoming urban working-class; 5 Conclusion: Becoming a 'modern' man; 6 Postscript: Youth, aspirations and masculinities; Appendix: Research participants; Notes; Bibliography; Index
Record Nr. UNINA-9910818815303321
Lin Xiaodong  
Abingdon, Oxon : , : Routledge, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Introductory Computer Forensics : A Hands-on Practical Approach / / by Xiaodong Lin
Introductory Computer Forensics : A Hands-on Practical Approach / / by Xiaodong Lin
Autore Lin Xiaodong
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XXIII, 577 p. 459 illus., 347 illus. in color.)
Disciplina 363.252
364.168
Soggetto topico Data protection
Forensic science
Computer crimes
Computer security
Multimedia information systems
Security
Forensic Science
Cybercrime
Systems and Data Security
Multimedia Information Systems
ISBN 3-030-00581-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Introduction to Computer Forensics -- 2 Introduction to Computer Organization -- 3 Building a Forensics Workstation -- 4 Volume Analysis -- 5 Examining FAT File System -- 6 Deleted File Recovery in FAT -- 7 Examining NTFS File System -- 8 Deleted File Recovery in NTFS -- 9 File Carving -- 10 File Signature Searching Forensics -- 11 Keyword Forensics -- 12 Timeline Analysis -- 13 Data Hiding and Detection -- 14 Log Analysis -- 15 Android Forensics -- 16 GPS Forensics -- 17 SIM Cards Forensics -- 18 Introductory Malware Analysis -- 19 Ransomware Analysis -- 20 Image Forgery Detection -- 21 Steganography and Steganalysis.
Record Nr. UNINA-9910299351603321
Lin Xiaodong  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy-Enhancing Fog Computing and Its Applications / / by Xiaodong Lin, Jianbing Ni, Xuemin (Sherman) Shen
Privacy-Enhancing Fog Computing and Its Applications / / by Xiaodong Lin, Jianbing Ni, Xuemin (Sherman) Shen
Autore Lin Xiaodong
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (98 pages)
Disciplina 005.8
Collana SpringerBriefs in Electrical and Computer Engineering
Soggetto topico Data protection
Wireless communication systems
Mobile communication systems
Electrical engineering
Security
Wireless and Mobile Communication
Communications Engineering, Networks
ISBN 3-030-02113-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Introduction -- 2 Privacy-enhancing Technologies -- 3 Identity Privacy Protection in Smart Parking Navigation -- 4 Location Privacy Protection in Mobile Crowdsensing -- 5 Data Privacy Protection in Smart Grid -- 6 Conclusions and Future Directions.
Record Nr. UNINA-9910299347503321
Lin Xiaodong  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicular ad hoc network security and privacy / / Xiaodong Lin, Rongxing Lu
Vehicular ad hoc network security and privacy / / Xiaodong Lin, Rongxing Lu
Autore Lin Xiaodong
Pubbl/distr/stampa Hoboken [New Jersey] : , : IEEE Press/Wiley, , [2015]
Descrizione fisica 1 online resource (237 p.)
Disciplina 388.312
Collana IEEE press series on information and communication networks security
IEEE Press series on information & communication networks security
Soggetto topico Vehicular ad hoc networks (Computer networks)
ISBN 1-119-08216-1
1-119-08215-3
1-119-08214-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto List of Figures xi -- List of Tables xv -- Acronyms xvii -- Preface xix -- 1 INTRODUCTION 1 -- 1.1 Background 1 -- 1.2 DSRC AND VANET 2 -- 1.2.1 DSRC 2 -- 1.2.2 VANET 3 -- 1.2.3 Characteristics of VANET 6 -- 1.3 Security and Privacy Threats 7 -- 1.4 Security and Privacy Requirements 8 -- 1.5 Challenges and Prospects 9 -- 1.5.1 Conditional Privacy Preservation in VANETs 9 -- 1.5.2 Authentication with Efficient Revocation in VANETs 10 -- 1.6 Standardization and Related Activities 11 -- 1.7 Security Primitives 13 -- 1.8 Outline of the Book 17 -- References 17 -- 2 GSIS: GROUP SIGNATURE AND ID-BASED SIGNATURE-BASED SECURE AND PRIVACY-PRESERVING PROTOCOL 21 -- 2.1 Introduction 21 -- 2.2 Preliminaries and Background 23 -- 2.2.1 Group Signature 23 -- 2.2.2 Bilinear Pairing and ID-Based Cryptography 23 -- 2.2.3 Threat Model 23 -- 2.2.4 Desired Requirements 24 -- 2.3 Proposed Secure and Privacy-Preserving Protocol 25 -- 2.3.1 Problem Formulation 25 -- 2.3.2 System Setup 27 -- 2.3.3 Security Protocol between OBUs 29 -- 2.3.4 Security Protocol between RSUs and OBUs 38 -- 2.4 Performance Evaluation 41 -- 2.4.1 Impact of Traffic Load 43 -- 2.4.2 Impact of Cryptographic Signature Verification Delay 43 -- 2.4.3 Membership Revocation and Tracing Efficiency 45 -- 2.5 Concluding Remarks 47 -- References 47 -- 3 ECPP: EFFICIENT CONDITIONAL PRIVACY PRESERVATION PROTOCOL 51 -- 3.1 Introduction 51 -- 3.2 System Model and Problem Formulation 52 -- 3.2.1 System Model 52 -- 3.2.2 Design Objectives 54 -- 3.3 Proposed ECPP Protocol 55 -- 3.3.1 System Initialization 55 -- 3.3.2 OBU Short-Time Anonymous Key Generation 56 -- 3.3.3 OBU Safety Message Sending 62 -- 3.3.4 OBU Fast Tracking Algorithm 63 -- 3.4 Analysis on Conditional Privacy Preservation 64 -- 3.5 Performance Analysis 66 -- 3.5.1 OBU Storage Overhead 66 -- 3.5.2 OBU Computation Overhead on Verification 66 -- 3.5.3 TA Computation Complexity on OBU Tracking 68 -- 3.6 Concluding Remarks 69 -- References 69 -- 4 PSEUDONYM-CHANGING STRATEGY FOR LOCATION PRIVACY 71.
4.1 Introduction 71 -- 4.2 Problem Definition 73 -- 4.2.1 Network Model 73 -- 4.2.2 Threat Model 74 -- 4.2.3 Location Privacy Requirements 75 -- 4.3 Proposed PCS Strategy for Location Privacy 75 -- 4.3.1 KPSD Model for PCS Strategy 75 -- 4.3.2 Anonymity Set Analysis for Achieved Location Privacy 79 -- 4.3.3 Feasibility Analysis of PCS Strategy 85 -- 4.4 Performance Evaluation 86 -- 4.5 Concluding Remarks 89 -- References 89 -- 5 RSU-AIDED MESSAGE AUTHENTICATION 91 -- 5.1 Introduction 91 -- 5.2 System Model and Preliminaries 93 -- 5.2.1 System Model 93 -- 5.2.2 Assumption 93 -- 5.2.3 Problem Statement 94 -- 5.2.4 Security Objectives 95 -- 5.3 Proposed RSU-Aided Message Authentication Scheme 96 -- 5.3.1 Overview 96 -- 5.3.2 Mutual Authentication and Key Agreement between RSUs and Vehicles 96 -- 5.3.3 Hash Aggregation 98 -- 5.3.4 Verification 99 -- 5.3.5 Privacy Enhancement 100 -- 5.4 Performance Evaluation 101 -- 5.4.1 Message Loss Ratio 102 -- 5.4.2 Message Delay 102 -- 5.4.3 Communication Overhead 104 -- 5.5 Security Analysis 105 -- 5.6 Concluding Remarks 106 -- References 107 -- 6 TESLA-BASED BROADCAST AUTHENTICATION 109 -- 6.1 Introduction 109 -- 6.2 Timed Efficient and Secure Vehicular Communication Scheme 110 -- 6.2.1 Preliminaries 110 -- 6.2.2 System Formulation 112 -- 6.2.3 Proposed TSVC Scheme 113 -- 6.2.4 Enhanced TSVC with Nonrepudiation 118 -- 6.2.5 Discussion 123 -- 6.3 Security Analysis 129 -- 6.4 Performance Evaluation 129 -- 6.4.1 Impact of Vehicle Moving Speed 131 -- 6.4.2 Impact of Vehicle Density 132 -- 6.5 Concluding Remarks 134 -- References 134 -- 7 DISTRIBUTED COOPERATIVE MESSAGE AUTHENTICATION 137 -- 7.1 Introduction 137 -- 7.2 Problem Formulation 138 -- 7.2.1 Network Model 138 -- 7.2.2 Security Model 139 -- 7.3 Basic Cooperative Authentication Scheme 140 -- 7.4 Secure Cooperative Authentication Scheme 141 -- 7.4.1 Evidence and Token for Fairness 142 -- 7.4.2 Authentication Proof 145 -- 7.4.3 Flows of Proposed Scheme 146 -- 7.5 Security Analysis 147.
7.5.1 Linkability Attack 147 -- 7.5.2 Free-Riding Attack without Authentication Efforts 147 -- 7.5.3 Free-Riding Attack with Fake Authentication Efforts 148 -- 7.6 Performance Evaluation 148 -- 7.6.1 Simulation Settings 148 -- 7.6.2 Simulation Results 149 -- 7.7 Concluding Remarks 150 -- References 151 -- 8 CONTEXT-AWARE COOPERATIVE AUTHENTICATION 153 -- 8.1 Introduction 153 -- 8.2 Message Trustworthiness in VANETs 156 -- 8.3 System Model and Design Goal 159 -- 8.3.1 Network Model 159 -- 8.3.2 Attack Model 159 -- 8.3.3 Design Goals 160 -- 8.4 Preliminaries 160 -- 8.4.1 Pairing Technique 160 -- 8.4.2 Aggregate Signature and Batch Verification 160 -- 8.5 Proposed AEMAT Scheme 161 -- 8.5.1 System Setup 161 -- 8.5.2 Registration 162 -- 8.5.3 SER Generation and Broadcasting 162 -- 8.5.4 SER Opportunistic Forwarding 162 -- 8.5.5 SER Aggregated Authentication 163 -- 8.5.6 SER Aggregated Trustworthiness 165 -- 8.6 Security Discussion 168 -- 8.6.1 Collusion Attacks 168 -- 8.6.2 Privacy Protection of Witnesses 168 -- 8.7 Performance Evaluation 169 -- 8.7.1 Transmission Cost 169 -- 8.7.2 Computational Cost 169 -- 8.8 Concluding Remarks 170 -- References 170 -- 9 FAST HANDOVER AUTHENTICATION BASED ON MOBILITY PREDICTION 173 -- 9.1 Introduction 173 -- 9.2 Vehicular Network Architecture 175 -- 9.3 Proposed Fast Handover Authentication Scheme Based on Mobility Prediction 176 -- 9.3.1 Multilayer Perceptron Classifier 176 -- 9.3.2 Proposed Authentication Scheme 178 -- 9.4 Security Analysis 183 -- 9.4.1 Replay Attack 183 -- 9.4.2 Forward Secrecy 183 -- 9.5 Performance Evaluation 184 -- 9.6 Concluding Remarks 185 -- References 186 -- Index 187.
Record Nr. UNINA-9910208814703321
Lin Xiaodong  
Hoboken [New Jersey] : , : IEEE Press/Wiley, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Vehicular ad hoc network security and privacy / / Xiaodong Lin, Rongxing Lu
Vehicular ad hoc network security and privacy / / Xiaodong Lin, Rongxing Lu
Autore Lin Xiaodong
Pubbl/distr/stampa Hoboken [New Jersey] : , : IEEE Press/Wiley, , [2015]
Descrizione fisica 1 online resource (237 p.)
Disciplina 388.312
Collana IEEE press series on information and communication networks security
IEEE Press series on information & communication networks security
Soggetto topico Vehicular ad hoc networks (Computer networks)
ISBN 1-119-08216-1
1-119-08215-3
1-119-08214-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto List of Figures xi -- List of Tables xv -- Acronyms xvii -- Preface xix -- 1 INTRODUCTION 1 -- 1.1 Background 1 -- 1.2 DSRC AND VANET 2 -- 1.2.1 DSRC 2 -- 1.2.2 VANET 3 -- 1.2.3 Characteristics of VANET 6 -- 1.3 Security and Privacy Threats 7 -- 1.4 Security and Privacy Requirements 8 -- 1.5 Challenges and Prospects 9 -- 1.5.1 Conditional Privacy Preservation in VANETs 9 -- 1.5.2 Authentication with Efficient Revocation in VANETs 10 -- 1.6 Standardization and Related Activities 11 -- 1.7 Security Primitives 13 -- 1.8 Outline of the Book 17 -- References 17 -- 2 GSIS: GROUP SIGNATURE AND ID-BASED SIGNATURE-BASED SECURE AND PRIVACY-PRESERVING PROTOCOL 21 -- 2.1 Introduction 21 -- 2.2 Preliminaries and Background 23 -- 2.2.1 Group Signature 23 -- 2.2.2 Bilinear Pairing and ID-Based Cryptography 23 -- 2.2.3 Threat Model 23 -- 2.2.4 Desired Requirements 24 -- 2.3 Proposed Secure and Privacy-Preserving Protocol 25 -- 2.3.1 Problem Formulation 25 -- 2.3.2 System Setup 27 -- 2.3.3 Security Protocol between OBUs 29 -- 2.3.4 Security Protocol between RSUs and OBUs 38 -- 2.4 Performance Evaluation 41 -- 2.4.1 Impact of Traffic Load 43 -- 2.4.2 Impact of Cryptographic Signature Verification Delay 43 -- 2.4.3 Membership Revocation and Tracing Efficiency 45 -- 2.5 Concluding Remarks 47 -- References 47 -- 3 ECPP: EFFICIENT CONDITIONAL PRIVACY PRESERVATION PROTOCOL 51 -- 3.1 Introduction 51 -- 3.2 System Model and Problem Formulation 52 -- 3.2.1 System Model 52 -- 3.2.2 Design Objectives 54 -- 3.3 Proposed ECPP Protocol 55 -- 3.3.1 System Initialization 55 -- 3.3.2 OBU Short-Time Anonymous Key Generation 56 -- 3.3.3 OBU Safety Message Sending 62 -- 3.3.4 OBU Fast Tracking Algorithm 63 -- 3.4 Analysis on Conditional Privacy Preservation 64 -- 3.5 Performance Analysis 66 -- 3.5.1 OBU Storage Overhead 66 -- 3.5.2 OBU Computation Overhead on Verification 66 -- 3.5.3 TA Computation Complexity on OBU Tracking 68 -- 3.6 Concluding Remarks 69 -- References 69 -- 4 PSEUDONYM-CHANGING STRATEGY FOR LOCATION PRIVACY 71.
4.1 Introduction 71 -- 4.2 Problem Definition 73 -- 4.2.1 Network Model 73 -- 4.2.2 Threat Model 74 -- 4.2.3 Location Privacy Requirements 75 -- 4.3 Proposed PCS Strategy for Location Privacy 75 -- 4.3.1 KPSD Model for PCS Strategy 75 -- 4.3.2 Anonymity Set Analysis for Achieved Location Privacy 79 -- 4.3.3 Feasibility Analysis of PCS Strategy 85 -- 4.4 Performance Evaluation 86 -- 4.5 Concluding Remarks 89 -- References 89 -- 5 RSU-AIDED MESSAGE AUTHENTICATION 91 -- 5.1 Introduction 91 -- 5.2 System Model and Preliminaries 93 -- 5.2.1 System Model 93 -- 5.2.2 Assumption 93 -- 5.2.3 Problem Statement 94 -- 5.2.4 Security Objectives 95 -- 5.3 Proposed RSU-Aided Message Authentication Scheme 96 -- 5.3.1 Overview 96 -- 5.3.2 Mutual Authentication and Key Agreement between RSUs and Vehicles 96 -- 5.3.3 Hash Aggregation 98 -- 5.3.4 Verification 99 -- 5.3.5 Privacy Enhancement 100 -- 5.4 Performance Evaluation 101 -- 5.4.1 Message Loss Ratio 102 -- 5.4.2 Message Delay 102 -- 5.4.3 Communication Overhead 104 -- 5.5 Security Analysis 105 -- 5.6 Concluding Remarks 106 -- References 107 -- 6 TESLA-BASED BROADCAST AUTHENTICATION 109 -- 6.1 Introduction 109 -- 6.2 Timed Efficient and Secure Vehicular Communication Scheme 110 -- 6.2.1 Preliminaries 110 -- 6.2.2 System Formulation 112 -- 6.2.3 Proposed TSVC Scheme 113 -- 6.2.4 Enhanced TSVC with Nonrepudiation 118 -- 6.2.5 Discussion 123 -- 6.3 Security Analysis 129 -- 6.4 Performance Evaluation 129 -- 6.4.1 Impact of Vehicle Moving Speed 131 -- 6.4.2 Impact of Vehicle Density 132 -- 6.5 Concluding Remarks 134 -- References 134 -- 7 DISTRIBUTED COOPERATIVE MESSAGE AUTHENTICATION 137 -- 7.1 Introduction 137 -- 7.2 Problem Formulation 138 -- 7.2.1 Network Model 138 -- 7.2.2 Security Model 139 -- 7.3 Basic Cooperative Authentication Scheme 140 -- 7.4 Secure Cooperative Authentication Scheme 141 -- 7.4.1 Evidence and Token for Fairness 142 -- 7.4.2 Authentication Proof 145 -- 7.4.3 Flows of Proposed Scheme 146 -- 7.5 Security Analysis 147.
7.5.1 Linkability Attack 147 -- 7.5.2 Free-Riding Attack without Authentication Efforts 147 -- 7.5.3 Free-Riding Attack with Fake Authentication Efforts 148 -- 7.6 Performance Evaluation 148 -- 7.6.1 Simulation Settings 148 -- 7.6.2 Simulation Results 149 -- 7.7 Concluding Remarks 150 -- References 151 -- 8 CONTEXT-AWARE COOPERATIVE AUTHENTICATION 153 -- 8.1 Introduction 153 -- 8.2 Message Trustworthiness in VANETs 156 -- 8.3 System Model and Design Goal 159 -- 8.3.1 Network Model 159 -- 8.3.2 Attack Model 159 -- 8.3.3 Design Goals 160 -- 8.4 Preliminaries 160 -- 8.4.1 Pairing Technique 160 -- 8.4.2 Aggregate Signature and Batch Verification 160 -- 8.5 Proposed AEMAT Scheme 161 -- 8.5.1 System Setup 161 -- 8.5.2 Registration 162 -- 8.5.3 SER Generation and Broadcasting 162 -- 8.5.4 SER Opportunistic Forwarding 162 -- 8.5.5 SER Aggregated Authentication 163 -- 8.5.6 SER Aggregated Trustworthiness 165 -- 8.6 Security Discussion 168 -- 8.6.1 Collusion Attacks 168 -- 8.6.2 Privacy Protection of Witnesses 168 -- 8.7 Performance Evaluation 169 -- 8.7.1 Transmission Cost 169 -- 8.7.2 Computational Cost 169 -- 8.8 Concluding Remarks 170 -- References 170 -- 9 FAST HANDOVER AUTHENTICATION BASED ON MOBILITY PREDICTION 173 -- 9.1 Introduction 173 -- 9.2 Vehicular Network Architecture 175 -- 9.3 Proposed Fast Handover Authentication Scheme Based on Mobility Prediction 176 -- 9.3.1 Multilayer Perceptron Classifier 176 -- 9.3.2 Proposed Authentication Scheme 178 -- 9.4 Security Analysis 183 -- 9.4.1 Replay Attack 183 -- 9.4.2 Forward Secrecy 183 -- 9.5 Performance Evaluation 184 -- 9.6 Concluding Remarks 185 -- References 186 -- Index 187.
Record Nr. UNINA-9910830597903321
Lin Xiaodong  
Hoboken [New Jersey] : , : IEEE Press/Wiley, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui