Handbook of Research on Wireless Security

Pirmais vāks
Yan Zhang, Jun Zheng, Miao Ma
Idea Group Inc (IGI), 2008. gada 1. janv. - 860 lappuses
"This book combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative reference source forstudents, educators, faculty members, researchers, engineers in the field of wireless security, it will make an invaluable addition to any library collection"--Provided by publisher.

No grāmatas satura

Atlasītās lappuses

Saturs

Malicious Software in Mobile Devices
1
Secure Service Discovery
10
Security of Mobile Code
28
Identity Management
44
Wireless Wardriving
61
Intrusion and Anomaly Detection in Wireless Networks
78
PeertoPeer P2P Network Security Firewall Issues
95
Identity Management for Wireless Service Access
104
Security in Mobile Ad Hoc Networks
413
Privacy and Anonymity in Mobile Ad Hoc Networks
431
Secure Routing with Reputation in MANET
449
Trust Management and ContextDriven Access Control
461
A Survey of Key Management in Mobile Ad Hoc Networks
479
Security Measures for Mobile AdHoc Networks MANETs
500
A Novel Secure Video Surveillance System Over Wireless Ad Hoc Networks
515
Cutting the Gordian Knot Intrusion Detection Systems in Ad Hoc Networks
531

PrivacyEnhancing Technique A Survey and Classification
115
Vulnerability Analysis and Defenses in Wireless Networks
129
Key Distribution and Management for Mobile Applications
145
Architecture and Protocols for Authentication Authorization and Accounting in the Future Wireless Communications Networks
158
Authentication Authorisation and Access Control in Mobile Systems
176
Trustworthy Networks Authentication Privacy and Security Models
189
The Provably Secure Formal Methods for Authentication and Key Agreement Protocols
210
Multimedia Encryption and Watermarking in Wireless Environment
236
SystemonChip Design of the Whirlpool Hash Function
256
Security in 3GB3G4G
271
Security in 4G
272
Security Architectures for B3G Mobile Networks
297
Security in UMTS 3G Mobile Networks
318
Access Security in UMTS and IMS
339
Security in 25G Mobile Systems
351
Chapter XXIII EndtoEnd Security Comparisons Between IEEE 80216e and 3G Technologies
364
Generic Application Security in Current and Future Networks
379
Authentication Authorization and Accounting AAA Framework in Network Mobility NEMO Environments
395
Security in Ad Hoc and Sensor Networks
412
Security in Wireless Sensor Networks
547
Security and Privacy in Wireless Sensor Networks Challenges and Solutions
565
Routing Security in Wireless Sensor Networks
582
Localization Security in Wireless Sensor Networks
617
Resilience Against False Data Injection Attack in Wireless Sensor Networks
628
Survivability of Sensors with Key and Trust Management
636
Security in Wireless PANLAN MAN Networks
665
Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections
666
Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring
681
Security in WLAN
695
Access Control in Wireless Local Area Networks Fast Authentication Schemes
710
Security and Privacy in RFID Based Wireless Networks
723
Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks LANs MANs
732
EndtoEnd E2E Security Approach in WiMAX A Security Technical Overview for Corporate Multimedia Applications
747
Evaluation of Security Architectures for Mobile Broadband Access
759
Extensible Authentication EAP Protocol Integrations in the Next Generation Cellular Networks
776
About the Contributors
791
Index
813
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Bibliogrāfiskā informācija