Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment.
However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios.
Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the keyissues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.
Jiadi Yu is currently an Associate Professor in Department of Computer Science and Engineering, Shanghai Jiao Tong University. Prof. Yu is an active and accomplished researcher in the field of Mobile Computing and Sensing, Cyber Security and Privacy, and Internet of Things (IoT) . He has authored the book "Sensing Vehicle Conditions for Detecting Driving Behaviors" (Springer, 2018), and published more than 100 refereed paper, which have been cited over 2500 times in Google Scholar. As conference organization, Prof. Yu was Publicity Co-Chair of IEEE DySPAN 2019 and ACM WiSec 2019. As Technical Program Committees, he was TPC Member of IEEE INFOCOM (2016-2022), AAAI 2022, IEEE ICDCS 2022, IEEE ICPADS (2014, 2019, 2020), etc. He also was peer referee for IEEE Transactions on Mobile Computing (TMC), IEEE Transactions on Parallel and Distributed Systems (TPDS), IEEE Transactions on Information Forensics and Security (TIFS), IEEE/ACM Transactions on Networking (ToN), etc.
Hao Kongis currently an assistant professor in School of Computer Engineering and Science, Shanghai University. He received his PhD from Shanghai Jiao Tong University under the supervision of Prof. Jiadi Yu. His research interests include mobile sensing and computing, and IoT.
Linghe Kong is currently a Professor with the Department of Computer Science and Engineering, Shanghai Jiao Tong University. He is the leader of the Intelligent Network and Trusted Computing Laboratory. His research interests include wireless networks, big data, mobile computing, and the Internet of Things.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.