Handbook of research on wireless security
Titre:
Handbook of research on wireless security
ISBN (Numéro international normalisé des livres):
9781599049007
PRODUCTION_INFO:
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2008.
Description physique:
electronic texts (860 p. : ill.) : digital files.
Table des matières:
Malicious Software in Mobile Devices / Thomas M. Chen, Cyrus Peikari -- Secure Service Discovery / Sheikh I. Ahamed ... [et al.] -- Security of Mobile Code / Zbigniew Kotulski, Aneta Zwierko -- Identity Management / Kumbesan Sandrasegaran, Mo Li -- Wireless Wardriving / Luca Caviglione -- Intrusion and Anomaly Detection in Wireless Networks / Amel Meddeb Makhlouf, Noureddine Boudriga -- Peer-to-Peer (P2P) Network Security: Firewall Issues / Lu Yan -- Identity Management for Wireless Service Access / Mohammad M.R. Chowdhury, Josef Noll -- Privacy Enhancing Techniques: A Survey and Classification / Peter Langendörfer ... [et al.] -- Vulnerability Analysis and Defenses in Wireless Networks / Lawan A. Mohammad, Biju Issac -- Key Distribution and Management for Mobile Applications / György Kálmán, Josef Noll -- Architecture and Protocols for Authentications, Authorization, and Accounting (AAA) in the Future Wireless Communications Networks / Said Zaghloul, Admela Jukan -- Authentication, Authorisation, and Access Control in Mobile Systems / Josef Noll, György Kálmán -- Trustworthy Networks, Authentication, Privacy, and Security Models / Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga -- The Provably Secure Formal Methods for Authentication and Key Agreement Protocols / Jianfeng Ma, Xinghua Li -- Multimedia Encryption and Watermarking in Wireless Environment / Shiguo Lian -- System-on-Chip Design of the Whirlpool Hash Function / Paris Kitsos --
Security in 4G / Artur Hecker, Mohamad Badra -- Security Architectures for B3G Mobile Networks / Christoforos Ntantogian, Christos Xenakis -- Security in UMTS 3G Mobile Networks / Christos Xenakis -- Access Security in UMTS and IMS / Yan Zhang ... [et al.] -- Security in 2.5G Mobile Systems / Christos Xenakis -- End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies / Sasan Adibi, Gordon B. Agnew -- Generic Application Security in Current and Future Networks / Silke Holtmanns, Pekka Laitinen -- Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments / Sangheon Pack ... [et al.] -- Security in Mobile Ad Hoc Networks / Bin Lu -- Privacy and Anonymity in Mobile Ad Hoc Networks / Christer Andersson, Leonardo A. Martucci, Simone Fischer-Hübner -- Secure Routing with Reputation in MANET / Tomasz Ciszkowski, Zbigniew Kotulski -- Trust Management and Context-Driven Access Control / Paolo Bellavista ... [et al.] -- A Survey of Key Management in Mobile Ad Hoc Networks / Bing Wu, Jie Wu, Mihaela Cardei -- Security Measures for Mobile Ad-Hoc Networks (MANETs) / Sasan Adibi, Gordon B. Agnew -- A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks / Hao Yin ... [et al.] -- Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks / John Felix Charles Joseph ... [et al.] -- Security in Wireless Sensor Networks / Luis E. Palafox, J. Antonio Garcia-Macias -- Security and Privacy in Wireless Sensor Networks: Challenges and Solutions / Mohamed Hamdi, Noreddine Boudriga --
Routing Security in Wireless Sensor Networks / A.R. Naseer, Ismat K. Maarouf, Ashraf S. Hasan -- Localization Security in Wireless Sensor Networks / Yawen Wei, Zhen Yu, Yong Guan -- Resilience Against False Data Injection Attack in Wireless Sensor Networks / Miao Ma -- Survivability of Sensors with Key and Trust Management / Jean-Marc Seigneur, Luminita Moraru, Olivier Powell -- Fault Tolerant Topology Design for Ad Hoc and Sensor Networks / Yu Wang -- Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections / Georgios Kambourakis, Angelos Rouskas, Stefanos Gritzalis -- Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring / Miguel A. Ruiz ... [et al.] -- Security in WLAN / Mohamad Badra, Artur Hecker -- Access Control in Wireless Local Area Networks: Fast Authentication Schemes / Jahan Hassan, Björn Landfeldt, Albert Y. Zomaya -- Security and Privacy in RFID Based Wireless Networks / Denis Trcek -- Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANS) / Giorgos Kostopoulos, Nicolas Sklavos, Odysseas Koufopavlou -- End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications / Sasan Adibi, Gordon B. Agnew, Tom Tofigh -- Evaluation of Security Architectures for Mobile Broadband Access / Symeon Chatzinotas -- Extensible Authentication (EAP) Protocol Integrations in the Next Generation Cellular Networks / Sasan Adibi, Gordon B. Agnew.
Extrait:
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society. This handbook combines research from over 100 experts from 23 countries on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. It is an innovative and current reference source for students, educators, faculty members, researchers, and engineers in the field of wireless security.
Terme sujet:
Accès électronique:
Full Text Available From IGI Global 2008 Packages
Langue:
Anglais