Handbook of Research on Wireless SecurityYan Zhang, Jun Zheng, Miao Ma Idea Group Inc (IGI), 2008. gada 1. janv. - 860 lappuses "This book combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative reference source forstudents, educators, faculty members, researchers, engineers in the field of wireless security, it will make an invaluable addition to any library collection"--Provided by publisher. |
No grāmatas satura
1.–5. rezultāts no 39.
. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
i. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
xix. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
xx. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
xxiv. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
Malicious Software in Mobile Devices | 1 |
Secure Service Discovery | 10 |
Security of Mobile Code | 28 |
Identity Management | 44 |
Wireless Wardriving | 61 |
Intrusion and Anomaly Detection in Wireless Networks | 78 |
PeertoPeer P2P Network Security Firewall Issues | 95 |
Identity Management for Wireless Service Access | 104 |
Security in Mobile Ad Hoc Networks | 413 |
Privacy and Anonymity in Mobile Ad Hoc Networks | 431 |
Secure Routing with Reputation in MANET | 449 |
Trust Management and ContextDriven Access Control | 461 |
A Survey of Key Management in Mobile Ad Hoc Networks | 479 |
Security Measures for Mobile AdHoc Networks MANETs | 500 |
A Novel Secure Video Surveillance System Over Wireless Ad Hoc Networks | 515 |
Cutting the Gordian Knot Intrusion Detection Systems in Ad Hoc Networks | 531 |
PrivacyEnhancing Technique A Survey and Classification | 115 |
Vulnerability Analysis and Defenses in Wireless Networks | 129 |
Key Distribution and Management for Mobile Applications | 145 |
Architecture and Protocols for Authentication Authorization and Accounting in the Future Wireless Communications Networks | 158 |
Authentication Authorisation and Access Control in Mobile Systems | 176 |
Trustworthy Networks Authentication Privacy and Security Models | 189 |
The Provably Secure Formal Methods for Authentication and Key Agreement Protocols | 210 |
Multimedia Encryption and Watermarking in Wireless Environment | 236 |
SystemonChip Design of the Whirlpool Hash Function | 256 |
Security in 3GB3G4G | 271 |
Security in 4G | 272 |
Security Architectures for B3G Mobile Networks | 297 |
Security in UMTS 3G Mobile Networks | 318 |
Access Security in UMTS and IMS | 339 |
Security in 25G Mobile Systems | 351 |
Chapter XXIII EndtoEnd Security Comparisons Between IEEE 80216e and 3G Technologies | 364 |
Generic Application Security in Current and Future Networks | 379 |
Authentication Authorization and Accounting AAA Framework in Network Mobility NEMO Environments | 395 |
Security in Ad Hoc and Sensor Networks | 412 |
Security in Wireless Sensor Networks | 547 |
Security and Privacy in Wireless Sensor Networks Challenges and Solutions | 565 |
Routing Security in Wireless Sensor Networks | 582 |
Localization Security in Wireless Sensor Networks | 617 |
Resilience Against False Data Injection Attack in Wireless Sensor Networks | 628 |
Survivability of Sensors with Key and Trust Management | 636 |
Security in Wireless PANLAN MAN Networks | 665 |
Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections | 666 |
Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring | 681 |
Security in WLAN | 695 |
Access Control in Wireless Local Area Networks Fast Authentication Schemes | 710 |
Security and Privacy in RFID Based Wireless Networks | 723 |
Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks LANs MANs | 732 |
EndtoEnd E2E Security Approach in WiMAX A Security Technical Overview for Corporate Multimedia Applications | 747 |
Evaluation of Security Architectures for Mobile Broadband Access | 759 |
Extensible Authentication EAP Protocol Integrations in the Next Generation Cellular Networks | 776 |
About the Contributors | 791 |
813 | |
Citi izdevumi - Skatīt visu
Handbook of Research on Wireless Security Yan Zhang,Jun Zheng (Ph.D.),Miao Ma Ierobežota priekšskatīšana - 2008 |
Bieži izmantoti vārdi un frāzes
3GPP AAA protocol access control ad hoc networks adversary agent algorithm anonymous applications approach attacks authentication protocol base station Bluetooth certificate chapter cipher client communication Computer confidentiality connectivity context cryptographic deployed deployment Diameter distributed dynamic EAP-AKA EAP-SIM EAP-TLS encryption entity environment Figure function GPRS hash hoc networks identity IEEE implementation infrastructure integrity interface Internet intrusion detection IPsec key management layer malicious malware MANETs mobile ad hoc mobile devices multimedia operations packet Paper presented performance problem Proceedings proposed protection public key radio RADIUS request requirements Retrieved routing protocols scenario scheme secure routing security mechanisms sensor nodes service providers session key shared solutions specific standard subscriber Sybil attack techniques tion topology traffic transmission UMTS vulnerabilities wardriving watermarking WiMAX wireless networks wireless sensor networks WLAN