Cantitate/Preț
Produs

Secure Mobile Ad-hoc Networks and Sensors: First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers: Lecture Notes in Computer Science, cartea 4074

Editat de Mike Burmester, Alec Yasinsac
en Limba Engleză Paperback – 24 iul 2006

Din seria Lecture Notes in Computer Science

Preț: 36874 lei

Nou

Puncte Express: 553

Preț estimativ în valută:
7057 7445$ 5881£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540366461
ISBN-10: 3540366466
Pagini: 208
Ilustrații: X, 193 p.
Dimensiuni: 155 x 235 x 11 mm
Greutate: 0.3 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Computer Communication Networks and Telecommunications

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Mobile Ad-Hoc Networks and Sensors.- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.- Key Management for Mobile Sensor Networks.- Server-Aided RSA Key Generation Against Collusion Attack.- Hybrid Approach for Secure Mobile Agent Computations.- An XML Standards Based Authorization Framework for Mobile Agents.- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.- Detecting Impersonation Attacks in Future Wireless and Mobile Networks.- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.- “Fair” Authentication in Pervasive Computing.- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.- ARMS: An Authenticated Routing Message in Sensor Networks.- Security Analysis and Improvement of Return Routability Protocol.- Dark Encounter Computations.- Panel: Authentication in Constrained Environments.