Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…

This book will serve as a comprehensive resource for readers interested in utilizing different technologies like fog computing, federated learning, cloud computing, and blockchain in 6G-enabled systems for addressing security concerns.
Key Features:
Discusses technologies such as fog computing, federated learning, and blockchain in 6G-enabled networks to address security threats.
Provides in-depth coverage of fundamental models, architectures, and security frameworks to help readers understand the complex landscape of 6G and the Internet of Things (IoT) security.
Covers diverse areas of security frameworks and software-defined fixes for security problems in 6G and the IoT networks.
Presents protocols for authentication and key exchange in 6G and the IoT networks.
Highlights the use of the IoT for enhanced biometric authentication in security.
This book is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electrical and communications engineering, telecommunications, and computer science and engineering.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Stock availability can be subject to change without notice. We recommend calling the shop or contacting our online team to check availability of low stock items. Please see our Shopping Online page for more details.
This book will serve as a comprehensive resource for readers interested in utilizing different technologies like fog computing, federated learning, cloud computing, and blockchain in 6G-enabled systems for addressing security concerns.
Key Features:
Discusses technologies such as fog computing, federated learning, and blockchain in 6G-enabled networks to address security threats.
Provides in-depth coverage of fundamental models, architectures, and security frameworks to help readers understand the complex landscape of 6G and the Internet of Things (IoT) security.
Covers diverse areas of security frameworks and software-defined fixes for security problems in 6G and the IoT networks.
Presents protocols for authentication and key exchange in 6G and the IoT networks.
Highlights the use of the IoT for enhanced biometric authentication in security.
This book is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electrical and communications engineering, telecommunications, and computer science and engineering.