|
|
|
|
LEADER |
03709nam a22005055i 4500 |
001 |
978-0-387-71058-7 |
003 |
DE-He213 |
005 |
20151204165651.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387710587
|9 978-0-387-71058-7
|
024 |
7 |
|
|a 10.1007/978-0-387-71058-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.382
|2 23
|
245 |
1 |
0 |
|a Mobile and Wireless Network Security and Privacy
|h [electronic resource] /
|c edited by S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2007.
|
300 |
|
|
|a XIV, 224 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Research Directions in Security and Privacy for Mobile and Wireless Networks -- Pervasive Systems: Enhancing Trust Negotiation with Privacy Support -- Applying Trust in Mobile and Wireless Networks -- A Framework for Computing Trust in Mobile Ad-Hoc Networks -- The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security -- On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks -- Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries -- Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions -- An Anonymous MAC Protocol for Wireless Ad-hoc Networks -- Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks.
|
520 |
|
|
|a Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the foundation in setting priorities for research directions in this area. In the following chapters field experts expand upon the report and provide further information about important research directions in the fields of wireless networks and mobile computing. The chapters are written by the leading international researchers and professionals in thes fields. Each chapter represents state-of-the-art research and includes several influential contributions. A multitude of valuable discussions on relevant concepts, such as the various approaches that define emerging security and privacy in mobile and wireless environment, are featured. The book is useful to researchers working in the fields of mobile and wireless security and privacy and to graduate students seeking new areas to perform research. It also provides information for academics and industry people researching recent trends and developments in the mobile and wireless security fields.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Signal, Image and Speech Processing.
|
650 |
2 |
4 |
|a Electrical Engineering.
|
700 |
1 |
|
|a Makki, S. Kami.
|e editor.
|
700 |
1 |
|
|a Reiher, Peter.
|e editor.
|
700 |
1 |
|
|a Makki, Kia.
|e editor.
|
700 |
1 |
|
|a Pissinou, Niki.
|e editor.
|
700 |
1 |
|
|a Makki, Shamila.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387710570
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-0-387-71058-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|