000 03737nam a22005295i 4500
001 978-0-387-33112-6
003 DE-He213
005 20250710083950.0
007 cr nn 008mamaa
008 100301s2007 xxu| s |||| 0|eng d
020 _a9780387331126
_a99780387331126
024 7 _a10.1007/978-0-387-33112-6
_2doi
082 0 4 _a621.382
_223
100 1 _aXiao, Yang.
_eeditor.
245 1 0 _aWireless Network Security
_h[recurso electrónico] /
_cedited by Yang Xiao, Xuemin Sherman Shen, Ding-Zhu Du.
264 1 _aBoston, MA :
_bSpringer US,
_c2007.
300 _aVIII, 422 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSignals and Communication Technology,
_x1860-4862
505 0 _aSecurity in General Wireless/Mobile Networks -- High Performance Elliptic Curve Cryptographic Co-processor -- An Adaptive Encryption Protocol in Mobile Computing -- Security in Ad Hoc Network -- Pre-Authentication and Authentication Models in Ad Hoc Networks -- Promoting Identity-Based Key Management in Wireless Ad Hoc Networks -- A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks -- Secure Routing in Wireless Ad-Hoc Networks -- A Survey on Intrusion Detection in Mobile Ad Hoc Networks -- Security in Mobile Cellular Networks -- Intrusion Detection in Cellular Mobile Networks -- The Spread of Epidemics on Smartphones -- Security in Wireless LANs -- Cross-Domain Mobility-Adaptive Authentication -- AAA Architecture and Authentication for Wireless Lan roaming -- An Experimental Study on Security Protocols in Wlans -- Security in Sensor Networks -- Security Issues in Wireless Sensor Networks Used in Clinical Information Systems -- Key Management Schemes in Sensor Networks -- Secure Routing in AD HOC and Sensor Networks.
520 _aThis timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers. The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues.
650 0 _aENGINEERING.
650 0 _aCOMPUTER COMMUNICATION NETWORKS.
650 0 _aDATA ENCRYPTION (COMPUTER SCIENCE).
650 0 _aCOMPUTER INDUSTRY.
650 0 _aCOMPUTER SCIENCE.
650 0 _aTELECOMMUNICATION.
650 1 4 _aENGINEERING.
650 2 4 _aCOMMUNICATIONS ENGINEERING, NETWORKS.
650 2 4 _aDATA ENCRYPTION.
650 2 4 _aCOMPUTER COMMUNICATION NETWORKS.
650 2 4 _aTHE COMPUTER INDUSTRY.
650 2 4 _aPERSONAL COMPUTING.
700 1 _aShen, Xuemin Sherman.
_eeditor.
700 1 _aDu, Ding-Zhu.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387280400
830 0 _aSignals and Communication Technology,
_x1860-4862
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-33112-6
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-ENG
942 _2ddc
_cER
999 _c57243
_d57243