Secure mobile ad hoc networks and sensors
Autori
Parametre
Viac o knihe
InhaltsverzeichnisMobile Ad-Hoc Networks and Sensors.Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.Key Management for Mobile Sensor Networks.Server-Aided RSA Key Generation Against Collusion Attack.Hybrid Approach for Secure Mobile Agent Computations.An XML Standards Based Authorization Framework for Mobile Agents.Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.Detecting Impersonation Attacks in Future Wireless and Mobile Networks.Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.“Fair” Authentication in Pervasive Computing.Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.ARMS: An Authenticated Routing Message in Sensor Networks.Security Analysis and Improvement of Return Routability Protocol.Dark Encounter Computations.Panel: Authentication in Constrained Environments.
Nákup knihy
Secure mobile ad hoc networks and sensors, Mike Burmester
- Jazyk
- Rok vydania
- 2006
Doručenie
Platobné metódy
2021 2022 2023
Navrhnúť zmenu
- Titul
- Secure mobile ad hoc networks and sensors
- Jazyk
- anglicky
- Autori
- Mike Burmester
- Vydavateľ
- Springer
- Rok vydania
- 2006
- ISBN10
- 3540366466
- ISBN13
- 9783540366461
- Séria
- Lecture notes in computer science
- Kategórie
- Skriptá a vysokoškolské učebnice
- Anotácia
- InhaltsverzeichnisMobile Ad-Hoc Networks and Sensors.Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.Key Management for Mobile Sensor Networks.Server-Aided RSA Key Generation Against Collusion Attack.Hybrid Approach for Secure Mobile Agent Computations.An XML Standards Based Authorization Framework for Mobile Agents.Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.Detecting Impersonation Attacks in Future Wireless and Mobile Networks.Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.“Fair” Authentication in Pervasive Computing.Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.ARMS: An Authenticated Routing Message in Sensor Networks.Security Analysis and Improvement of Return Routability Protocol.Dark Encounter Computations.Panel: Authentication in Constrained Environments.