Wireless Network Security

Pirmais vāks
Yang Xiao, Xuemin Shen, Ding-Zhu Du
Springer Science & Business Media, 2007. gada 29. dec. - 424 lappuses

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

No grāmatas satura

Lietotāju komentāri - Rakstīt atsauksmi

Ierastajās vietās neesam atraduši nevienu atsauksmi.

Saturs

III
3
IV
43
V
63
VI
64
VII
83
VIII
103
X
137
XI
159
XVII
243
XVIII
247
XIX
273
XX
295
XXI
323
XXII
324
XXIV
341
XXV
381

XII
181
XIII
182
XV
211
XVI
242
XXVI
403
XXVII
407
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Populāri fragmenti

134. lappuse - Giuli, K. Lai and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks.
179. lappuse - J. Broch, DB Johnson, and DA Maltz. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks.
134. lappuse - In Proceedings of the sixth annual international conference on Mobile computing and networking (Mobicom '00), pages 56-67, Nov2003. 18. B. KarpandH. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks.
211. lappuse - Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Email: {zhangfan, chanson} @cs.ust.hk Abstract Multimedia applications over the Internet are becoming increasingly popular.
157. lappuse - Mobile Ad Hoc Networks. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02) (2002) 206-216 11.
229. lappuse - C is much larger than that of a random graph with the same number of vertices and average number of edges per vertex.
321. lappuse - N. Borisov, I. Goldberg, and D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11", proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, 2001.
380. lappuse - C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks.
81. lappuse - D. Balfanz, DK Smetters, P. Stewart, and H. Chi Wong, Talking to Strangers: Authentication in AdHoc Wireless Networks, Proceedings of Network and Distributed System Security Symposium 2002 (NDSS '02), 2002.
250. lappuse - The formula X is fresh, that is, X has not been sent in a message at any time before the current run of the protocol.

Bibliogrāfiskā informācija