
Parametry
Více o knize
InhaltsverzeichnisMobile Ad-Hoc Networks and Sensors.Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.Key Management for Mobile Sensor Networks.Server-Aided RSA Key Generation Against Collusion Attack.Hybrid Approach for Secure Mobile Agent Computations.An XML Standards Based Authorization Framework for Mobile Agents.Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.Detecting Impersonation Attacks in Future Wireless and Mobile Networks.Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.“Fair” Authentication in Pervasive Computing.Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.ARMS: An Authenticated Routing Message in Sensor Networks.Security Analysis and Improvement of Return Routability Protocol.Dark Encounter Computations.Panel: Authentication in Constrained Environments.
Nákup knihy
Secure mobile ad hoc networks and sensors, Mike Burmester
- Jazyk
- Rok vydání
- 2006
Doručení
Platební metody
Navrhnout úpravu
- Titul
- Secure mobile ad hoc networks and sensors
- Jazyk
- anglicky
- Autoři
- Mike Burmester
- Vydavatel
- Springer
- Rok vydání
- 2006
- ISBN10
- 3540366466
- ISBN13
- 9783540366461
- Kategorie
- Skripta a vysokoškolské učebnice
- Anotace
- InhaltsverzeichnisMobile Ad-Hoc Networks and Sensors.Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.Key Management for Mobile Sensor Networks.Server-Aided RSA Key Generation Against Collusion Attack.Hybrid Approach for Secure Mobile Agent Computations.An XML Standards Based Authorization Framework for Mobile Agents.Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.Detecting Impersonation Attacks in Future Wireless and Mobile Networks.Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.“Fair” Authentication in Pervasive Computing.Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.ARMS: An Authenticated Routing Message in Sensor Networks.Security Analysis and Improvement of Return Routability Protocol.Dark Encounter Computations.Panel: Authentication in Constrained Environments.