Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers /

This book constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September 2009. The workshop emphasizes on new ideas for secure architectures and protocols to enhance the emerging wireless systems. The 7 selected full papers cover topics on appl...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Gu, Qijun (Επιμελητής έκδοσης), Zang, Wanyu (Επιμελητής έκδοσης), Yu, Meng (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Σειρά:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 42
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03478nam a22005775i 4500
001 978-3-642-11526-4
003 DE-He213
005 20161207124552.0
007 cr nn 008mamaa
008 100301s2010 gw | s |||| 0|eng d
020 |a 9783642115264  |9 978-3-642-11526-4 
024 7 |a 10.1007/978-3-642-11526-4  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Security in Emerging Wireless Communication and Networking Systems  |h [electronic resource] :  |b First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers /  |c edited by Qijun Gu, Wanyu Zang, Meng Yu. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2010. 
300 |a IX, 89 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,  |x 1867-8211 ;  |v 42 
505 0 |a Session 1 - Session Chair: Nikolaos Preve -- A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security -- Enhanced Access Polynomial Based Self-healing Key Distribution -- Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments -- Session 2 - Session Chair: Theofilos Chrysikos -- RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks -- Integrating Wireless Sensor Networks with Computational Grids -- Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos -- Signalprint-Based Intrusion Detection in Wireless Networks. 
520 |a This book constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September 2009. The workshop emphasizes on new ideas for secure architectures and protocols to enhance the emerging wireless systems. The 7 selected full papers cover topics on applied cryptography, key management, vulnerability analysis, privacy, authentication, and intrusion detection for emerging wireless systems. . 
650 0 |a Computer science. 
650 0 |a Computer organization. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 0 |a Coding theory. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Data Encryption. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Computer Systems Organization and Communication Networks. 
700 1 |a Gu, Qijun.  |e editor. 
700 1 |a Zang, Wanyu.  |e editor. 
700 1 |a Yu, Meng.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642115257 
830 0 |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,  |x 1867-8211 ;  |v 42 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-11526-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)