The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at:
- Access control methods in cloud-enabled Internet of Things
- Secure routing algorithms for mobile ad-hoc networks
- Building security trust in mobile ad-hoc networks using soft computing methods
- The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain
- Password authentication and keystroke biometrics
- Health care data analytics over Big Data
- Bluetooth: and its open issues for managing security services in heterogenous networks
Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at:
- Access control methods in cloud-enabled Internet of Things
- Secure routing algorithms for mobile ad-hoc networks
- Building security trust in mobile ad-hoc networks using soft computing methods
- The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain
- Password authentication and keystroke biometrics
- Health care data analytics over Big Data
- Bluetooth: and its open issues for managing security services in heterogenous networks
Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control
192