Check nearby libraries
Buy this book
This edition doesn't have a description yet. Can you add one?
Check nearby libraries
Buy this book
Previews available in: English
Showing 2 featured editions. View all 2 editions?
Edition | Availability |
---|---|
1
Security in distributed and networking systems
2007, World Scientific
in English
9812708073 9789812708076
|
aaaa
Libraries near you:
WorldCat
|
2
Security in Distributed and Networking Systems (Computer and Netwrok Security)
September 30, 2007, World Scientific Publishing Company, World Scientific Publishing Co Pte Ltd
Hardcover
in English
9812708073 9789812708076
|
cccc
Libraries near you:
WorldCat
|
Book Details
Table of Contents
Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti
Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo
Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler
Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing
Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo
Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni
Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang
Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic
Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland
Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar
Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok
Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris
Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong
Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen
Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang
Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu
Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C. M. Leung
Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu.
Edition Notes
Includes bibliographical references.
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?June 17, 2023 | Edited by ImportBot | import existing book |
November 14, 2020 | Edited by MARC Bot | import existing book |
July 29, 2011 | Created by LC Bot | import new book |