| 000 | 02930cam a2200385 a 4500 | ||
|---|---|---|---|
| 001 | 14263901 | ||
| 005 | 20200126092918.0 | ||
| 008 | 060213s2007 nyua b 001 0 eng d | ||
| 010 | _a2006922217 | ||
| 020 | _a9780387280400 | ||
| 020 | _a0387280405 | ||
| 035 | _a(Sirsi) u561 | ||
| 040 |
_aEG-CaNU _cEG-CaNU _dEG-CaNU |
||
| 042 |
_alccopycat _a ncode |
||
| 050 | 0 | 0 |
_aTK5103.2 _b.W5735185 2007 |
| 082 | 0 | 0 |
_a005.8 _2 22 |
| 245 | 0 | 0 |
_aWireless network security / _c[edited by] Yang Xiao, Xuemin Shen, and Ding-Zhu Du. |
| 260 |
_aNew York : _bSpringer, _c2007. |
||
| 300 |
_aviii, 422 p. : _bill. ; _c25 cm. |
||
| 490 | 0 | _aSignals and communication technology | |
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aHigh Performance Elliptic Curve Cryptographic Co-Processor.- An Adaptive Encryption Protocol in Mobile Computing.- Pre-Authentication and Authentication Models in Ad Hoc Networks.- Promoting Identity-Based Key Management in Wireless Ad Hoc Networks.- A Survey on Intrustion Detection in Mobile Ad Hoc Networks.- Intrusion Detection in Cellular Mobile Networks.- The Spread of Epidemics on Smartphones.- Cross-Domain Mobility-Adaptive Authentication.- AAA Architecture and Authentication for Wireless LAN Roaming.- An Experimental Study on Security Protocols in WLANs.- Security Issues in Wireless Sensor Networks used in Clinical Information Systems.- Key Management Schemes in Sensor Networks.- Secure Routing in Ad Hoc and Sensor Networks. | |
| 520 | _aThis timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers. The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues. | ||
| 630 | 0 | 4 |
_aCIT. _914 |
| 630 | 0 | 4 |
_aITS. _9160 |
| 650 | 0 |
_aWireless communication systems. _911131 |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. _911132 |
|
| 650 | 0 |
_aMobile communication systems. _92232 |
|
| 700 | 1 |
_aXiao, Yang, _d1966- _911133 |
|
| 700 | 1 |
_aShen, X. _q(Xuemin), _d1958- _911134 |
|
| 700 | 1 |
_aDu, Dingzhu. _911135 |
|
| 596 | _a1 | ||
| 999 |
_c4617 _d4617 |
||