Suggested Topics within your search.
Suggested Topics within your search.
- History 737
- History and criticism 378
- Philosophy 276
- Social aspects 200
- Criticism and interpretation 181
- Politics and government 161
- Social conditions 130
- Religious aspects 107
- Political aspects 102
- Study and teaching 79
- Mathematics 72
- Research 66
- Psychological aspects 65
- Intellectual life 62
- Social life and customs 61
- Religion 58
- Education 56
- methods 54
- Architecture 53
- Christianity 53
- Motion pictures 53
- Race relations 52
- Political science 51
- Psychology 50
- Science 50
- Women 50
- Economic conditions 49
- Social sciences 48
- American literature 47
- Moral and ethical aspects 47
Search alternatives:
contemporary r » contemporary _ (Expand Search), contemporary oral (Expand Search), contemporary world (Expand Search)
contemporary r » contemporary _ (Expand Search), contemporary oral (Expand Search), contemporary world (Expand Search)
-
5141
Music in the USA : a documentary companion / Judith Tick editor with Paul Beaudoin assistant editor.
Published 2008Full text (Wentworth users only)
Electronic eBook -
5142
George Washington's eye : landscape, architecture, and design at Mount Vernon / Joseph Manca.
Published 2012Full text (Wentworth users only)
Electronic eBook -
5143
Paper memory : a sixteenth-century townsman writes his world / Matthew Lundin.
Published 2012Full text (Wentworth users only)
Electronic eBook -
5144
-
5145
Reading publics : New York City's public libraries, 1754-1911 / Tom Glynn.
Published 2015Full text (Wentworth users only)
Electronic eBook -
5146
Harriet Tubman : the life and the life stories / Jean M. Humez.
Published 2003Full text (Wentworth users only)
Electronic eBook -
5147
The world of child labor : an historical and regional survey / Hugh D. Hindman, editor.
Published 2009Table of Contents: “…Aderinto -- Child labor in Nigeria: historical perspective / Adelaja Odutola Odukoya -- Child labor in Senegal: contemporary and historical perspective / Loretta E. …”
Full text (Wentworth users only)
Electronic eBook -
5148
-
5149
-
5150
Security, privacy and reliability in computer communications and networks / editors, Kewei Sha, Aaron Striegel, Min Song.
Published 2017Table of Contents: “…Preface xv -- Acknowledgments xvii -- List of Contributors xix -- List of Figures xxiii -- List of Tables xxxi -- List of Algorithms xxxv -- List of Abbreviations xxxvii PART I: Privacy 1 Distributed Beamforming Relay Selection to Increase Base Station Anonymity inWireless Ad Hoc Networks 3 Jon R.Ward and Mohamed Younis 1.1 Introduction 4 -- 1.2 Anonymity Definition, Metrics, and Contemporary Measures 8 -- 1.2.1 Anonymity Definition and Assessment 8 -- 1.2.2 Antitraffic Analysis Measures 11 -- 1.3 System Assumptions and Attack Model 13 -- 1.3.1 Network Model 14 -- 1.3.2 Adversary Model 15 -- 1.3.3 Evidence Theory and Belief Metric 16 -- 1.4 Distributed Beamforming to Increase the BS Anonymity 21 -- 1.4.1 Overview of the DiBAN Protocol 21 -- 1.4.2 DiBAN Illustrative Example 25 -- 1.4.3 DiBAN Energy Analysis 26 -- 1.5 Distributed Beamforming Relay Selection Approach 28 -- 1.6 Validation Experiments 32 -- 1.6.1 Simulation Environment 32 -- 1.6.2 Simulation Results 32 -- 1.7 Conclusions and FutureWork 38 Appendix I: Numerical Evidence Theory Belief Calculation Example 39 -- References 42 -- 2 Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication 49 Cong Guo, Liehuang Zhu and Zijian Zhang 2.1 Introduction 50 -- 2.2 RelatedWorks 52 -- 2.3 System Model and Preliminaries 54 -- 2.3.1 Network Model 54 -- 2.3.2 Attack Model 55 -- 2.3.3 Security Requirements 55 -- 2.4 The Proposed PETS Scheme 56 -- 2.4.1 Scheme Overview 56 -- 2.4.2 System Initiation 56 -- 2.4.3 Vehicle-RSU Key Agreement 58 -- 2.4.4 Traffic Information Collection and Aggregation 59 -- 2.4.5 Traffic Jam Message Propagation 61 -- 2.5 Security Analysis 63 -- 2.6 Performance Evaluation 64 -- 2.6.1 Traffic Information Sending/Collection Overhead 65 -- 2.6.2 Traffic Information Propagation/Verification Overhead 66 -- 2.6.3 Scheme Simulation 68 -- 2.7 Conclusion 74 -- References 74 PART II: Vulnerabilities, Detection and Monitoring 3 DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection 79 Maciej Korczy?…”
Full text (WIT users only)
Electronic eBook