|
|
|
|
LEADER |
03786nam a22005535i 4500 |
001 |
978-0-387-33112-6 |
003 |
DE-He213 |
005 |
20151204182459.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387331126
|9 978-0-387-33112-6
|
024 |
7 |
|
|a 10.1007/978-0-387-33112-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Wireless Network Security
|h [electronic resource] /
|c edited by Yang Xiao, Xuemin Sherman Shen, Ding-Zhu Du.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2007.
|
300 |
|
|
|a VIII, 424 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Signals and Communication Technology,
|x 1860-4862
|
505 |
0 |
|
|a Security in General Wireless/Mobile Networks -- High Performance Elliptic Curve Cryptographic Co-processor -- An Adaptive Encryption Protocol in Mobile Computing -- Security in Ad Hoc Network -- Pre-Authentication and Authentication Models in Ad Hoc Networks -- Promoting Identity-Based Key Management in Wireless Ad Hoc Networks -- A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks -- Secure Routing in Wireless Ad-Hoc Networks -- A Survey on Intrusion Detection in Mobile Ad Hoc Networks -- Security in Mobile Cellular Networks -- Intrusion Detection in Cellular Mobile Networks -- The Spread of Epidemics on Smartphones -- Security in Wireless LANs -- Cross-Domain Mobility-Adaptive Authentication -- AAA Architecture and Authentication for Wireless Lan roaming -- An Experimental Study on Security Protocols in Wlans -- Security in Sensor Networks -- Security Issues in Wireless Sensor Networks Used in Clinical Information Systems -- Key Management Schemes in Sensor Networks -- Secure Routing in AD HOC and Sensor Networks.
|
520 |
|
|
|a This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers. The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer industry.
|
650 |
|
0 |
|a Personal computers.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a The Computer Industry.
|
650 |
2 |
4 |
|a Personal Computing.
|
700 |
1 |
|
|a Xiao, Yang.
|e editor.
|
700 |
1 |
|
|a Shen, Xuemin Sherman.
|e editor.
|
700 |
1 |
|
|a Du, Ding-Zhu.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387280400
|
830 |
|
0 |
|a Signals and Communication Technology,
|x 1860-4862
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-0-387-33112-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|