000 | 03692nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-0-387-71058-7 | ||
003 | DE-He213 | ||
005 | 20161121231150.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2007 xxu| s |||| 0|eng d | ||
020 |
_a9780387710587 _9978-0-387-71058-7 |
||
024 | 7 |
_a10.1007/978-0-387-71058-7 _2doi |
|
050 | 4 | _aTK1-9971 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aMobile and Wireless Network Security and Privacy _h[electronic resource] / _cedited by S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki. |
264 | 1 |
_aBoston, MA : _bSpringer US, _c2007. |
|
300 |
_aXIV, 224 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aResearch Directions in Security and Privacy for Mobile and Wireless Networks -- Pervasive Systems: Enhancing Trust Negotiation with Privacy Support -- Applying Trust in Mobile and Wireless Networks -- A Framework for Computing Trust in Mobile Ad-Hoc Networks -- The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security -- On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks -- Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries -- Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions -- An Anonymous MAC Protocol for Wireless Ad-hoc Networks -- Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks. | |
520 | _aMobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the foundation in setting priorities for research directions in this area. In the following chapters field experts expand upon the report and provide further information about important research directions in the fields of wireless networks and mobile computing. The chapters are written by the leading international researchers and professionals in thes fields. Each chapter represents state-of-the-art research and includes several influential contributions. A multitude of valuable discussions on relevant concepts, such as the various approaches that define emerging security and privacy in mobile and wireless environment, are featured. The book is useful to researchers working in the fields of mobile and wireless security and privacy and to graduate students seeking new areas to perform research. It also provides information for academics and industry people researching recent trends and developments in the mobile and wireless security fields. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aElectrical engineering. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSignal, Image and Speech Processing. |
650 | 2 | 4 | _aElectrical Engineering. |
700 | 1 |
_aMakki, S. Kami. _eeditor. |
|
700 | 1 |
_aReiher, Peter. _eeditor. |
|
700 | 1 |
_aMakki, Kia. _eeditor. |
|
700 | 1 |
_aPissinou, Niki. _eeditor. |
|
700 | 1 |
_aMakki, Shamila. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9780387710570 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-0-387-71058-7 |
912 | _aZDB-2-ENG | ||
950 | _aEngineering (Springer-11647) | ||
999 |
_c509536 _d509536 |