MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
080326s2008 enka b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2008295154 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0521873711 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(Sirsi) u346 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
EG-CaNU |
Transcribing agency |
EG-CaNU |
Modifying agency |
EG-CaNU |
042 ## - AUTHENTICATION CODE |
Authentication code |
ncode |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
245 10 - TITLE STATEMENT |
Title |
Security and cooperation in wireless networks : |
Remainder of title |
thwarting malicious and selfish behavior in the age of ubiquitous computing / |
Statement of responsibility, etc. |
Levente Buttya?n, Jean-Pierre Hubaux. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cambridge, UK ; |
-- |
New York : |
Name of publisher, distributor, etc. |
Cambridge University Press, |
Date of publication, distribution, etc. |
2008. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvii, 485 p. : |
Other physical details |
ill. ; |
Dimensions |
26 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (p. 458-478) and index. |
505 #0 - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction -- The security of existing wireless networks -- Upcoming wireless networks and new challenges -- Trust assumptions and adversary models -- Thwarting Malicious Behavior -- Naming and addressing -- Establishment of security associations -- Securing neighbor discovery -- Secure routing in multi-hop wireless networks -- Privacy protection -- Thwarting Selfish Behavio -- Selfish behavior at the MAC layer of CSMA/CA -- Selfishness in packet forwarding -- Wireless operators in a shared spectrum -- Secure protocols for behavior enforcement; Appendice -- Introduction to cryptographic algorithms and protocols -- tutorial on game theory for wireless networks |
520 ## - SUMMARY, ETC. |
Summary, etc. |
The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless networks, security has become a major concern and an area of great commercial importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in multi-hop and ad hoc networks. It is suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry. |
596 ## - |
-- |
1 |
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE |
Uniform title |
CIT. |
9 (RLIN) |
14 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Wireless communication systems |
General subdivision |
Security measures. |
9 (RLIN) |
445 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
6832 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Butty?n, Levente. |
9 (RLIN) |
6833 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hubaux, Jean-Pierre. |
9 (RLIN) |
6834 |