Image from Google Jackets

Mobile and Wireless Network Security and Privacy [recurso electrónico] / edited by S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki.

Por: Colaborador(es): Tipo de material: TextoTextoEditor: Boston, MA : Springer US, 2007Descripción: online resourceTipo de contenido:
  • text
Tipo de medio:
  • computer
Tipo de soporte:
  • recurso en línea
ISBN:
  • 9780387710587
  • 99780387710587
Tema(s): Formatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD:
  • 621.382 23
Recursos en línea:
Contenidos:
Research Directions in Security and Privacy for Mobile and Wireless Networks -- Pervasive Systems: Enhancing Trust Negotiation with Privacy Support -- Applying Trust in Mobile and Wireless Networks -- A Framework for Computing Trust in Mobile Ad-Hoc Networks -- The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security -- On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks -- Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries -- Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions -- An Anonymous MAC Protocol for Wireless Ad-hoc Networks -- Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks.
En: Springer eBooksResumen: Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the foundation in setting priorities for research directions in this area. In the following chapters field experts expand upon the report and provide further information about important research directions in the fields of wireless networks and mobile computing. The chapters are written by the leading international researchers and professionals in thes fields. Each chapter represents state-of-the-art research and includes several influential contributions. A multitude of valuable discussions on relevant concepts, such as the various approaches that define emerging security and privacy in mobile and wireless environment, are featured. The book is useful to researchers working in the fields of mobile and wireless security and privacy and to graduate students seeking new areas to perform research. It also provides information for academics and industry people researching recent trends and developments in the mobile and wireless security fields.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Libros electrónicos Libros electrónicos CICY Libro electrónico Libro electrónico 621.382 (Browse shelf(Opens below)) Available

Research Directions in Security and Privacy for Mobile and Wireless Networks -- Pervasive Systems: Enhancing Trust Negotiation with Privacy Support -- Applying Trust in Mobile and Wireless Networks -- A Framework for Computing Trust in Mobile Ad-Hoc Networks -- The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security -- On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks -- Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries -- Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions -- An Anonymous MAC Protocol for Wireless Ad-hoc Networks -- Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks.

Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the foundation in setting priorities for research directions in this area. In the following chapters field experts expand upon the report and provide further information about important research directions in the fields of wireless networks and mobile computing. The chapters are written by the leading international researchers and professionals in thes fields. Each chapter represents state-of-the-art research and includes several influential contributions. A multitude of valuable discussions on relevant concepts, such as the various approaches that define emerging security and privacy in mobile and wireless environment, are featured. The book is useful to researchers working in the fields of mobile and wireless security and privacy and to graduate students seeking new areas to perform research. It also provides information for academics and industry people researching recent trends and developments in the mobile and wireless security fields.

There are no comments on this title.

to post a comment.