000 03692nam a22005055i 4500
001 978-0-387-71058-7
003 DE-He213
005 20161121231150.0
007 cr nn 008mamaa
008 100301s2007 xxu| s |||| 0|eng d
020 _a9780387710587
_9978-0-387-71058-7
024 7 _a10.1007/978-0-387-71058-7
_2doi
050 4 _aTK1-9971
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
082 0 4 _a621.382
_223
245 1 0 _aMobile and Wireless Network Security and Privacy
_h[electronic resource] /
_cedited by S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki.
264 1 _aBoston, MA :
_bSpringer US,
_c2007.
300 _aXIV, 224 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aResearch Directions in Security and Privacy for Mobile and Wireless Networks -- Pervasive Systems: Enhancing Trust Negotiation with Privacy Support -- Applying Trust in Mobile and Wireless Networks -- A Framework for Computing Trust in Mobile Ad-Hoc Networks -- The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security -- On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks -- Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries -- Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions -- An Anonymous MAC Protocol for Wireless Ad-hoc Networks -- Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks.
520 _aMobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the foundation in setting priorities for research directions in this area. In the following chapters field experts expand upon the report and provide further information about important research directions in the fields of wireless networks and mobile computing. The chapters are written by the leading international researchers and professionals in thes fields. Each chapter represents state-of-the-art research and includes several influential contributions. A multitude of valuable discussions on relevant concepts, such as the various approaches that define emerging security and privacy in mobile and wireless environment, are featured. The book is useful to researchers working in the fields of mobile and wireless security and privacy and to graduate students seeking new areas to perform research. It also provides information for academics and industry people researching recent trends and developments in the mobile and wireless security fields.
650 0 _aEngineering.
650 0 _aComputer communication systems.
650 0 _aElectrical engineering.
650 1 4 _aEngineering.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSignal, Image and Speech Processing.
650 2 4 _aElectrical Engineering.
700 1 _aMakki, S. Kami.
_eeditor.
700 1 _aReiher, Peter.
_eeditor.
700 1 _aMakki, Kia.
_eeditor.
700 1 _aPissinou, Niki.
_eeditor.
700 1 _aMakki, Shamila.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387710570
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-71058-7
912 _aZDB-2-ENG
950 _aEngineering (Springer-11647)
999 _c509536
_d509536