Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New.
Language: English
Published by Taylor & Francis Ltd, 2021
ISBN 10: 1032173769 ISBN 13: 9781032173764
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. 1st edition NO-PA16APR2015-KAP.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 64.14
Quantity: Over 20 available
Add to basketCondition: New. In.
Language: English
Published by CRC Press 2021-09-30, 2021
ISBN 10: 1032173769 ISBN 13: 9781032173764
Seller: Chiron Media, Wallingford, United Kingdom
£ 61.93
Quantity: Over 20 available
Add to basketPaperback. Condition: New.
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New.
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 309 pages. 9.18x6.12x0.77 inches. In Stock.
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Attribute-Based Encryption and Access Control | Dijiang Huang (u. a.) | Taschenbuch | Einband - flex.(Paperback) | Englisch | 2021 | CRC Press | EAN 9781032173764 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Language: English
Published by CRC Press 2020-03-04, 2020
ISBN 10: 0815381352 ISBN 13: 9780815381358
Seller: Chiron Media, Wallingford, United Kingdom
Hardcover. Condition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Condition: New. Illustrated edition NO-PA16APR2015-KAP.
Condition: New.
Seller: Mispah books, Redhill, SURRE, United Kingdom
Hardcover. Condition: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
£ 64.97
Quantity: Over 20 available
Add to basketPAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies.FeaturesCovers cryptographic background knowledge for ABE and ABACFeatures various ABE constructions to achieve integrated access control capabilitiesOffers a comprehensive coverage of ABE-based ABACProvides ABE applications with real-world examplesAdvances the ABE research to support new mobile and data-centric applications 340 pp. Englisch.
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Dr. Dijiang Huang received his Bachelor of Science degree in Telecommunications from Beijing University of Posts & Telecommunications, China. He received his Master of Science and PhD degrees from University of Missouri-Kansas City m.
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies.FeaturesCovers cryptographic background knowledge for ABE and ABACFeatures various ABE constructions to achieve integrated access control capabilitiesOffers a comprehensive coverage of ABE-based ABACProvides ABE applications with real-world examplesAdvances the ABE research to support new mobile and data-centric applications.