Secure mobile ad hoc networks and sensors
Autoren
Parameter
Mehr zum Buch
InhaltsverzeichnisMobile Ad-Hoc Networks and Sensors.Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.Key Management for Mobile Sensor Networks.Server-Aided RSA Key Generation Against Collusion Attack.Hybrid Approach for Secure Mobile Agent Computations.An XML Standards Based Authorization Framework for Mobile Agents.Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.Detecting Impersonation Attacks in Future Wireless and Mobile Networks.Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.“Fair” Authentication in Pervasive Computing.Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.ARMS: An Authenticated Routing Message in Sensor Networks.Security Analysis and Improvement of Return Routability Protocol.Dark Encounter Computations.Panel: Authentication in Constrained Environments.
Buchkauf
Secure mobile ad hoc networks and sensors, Mike Burmester
- Sprache
- Erscheinungsdatum
- 2006
Lieferung
Zahlungsmethoden
Deine Änderungsvorschläge
- Titel
- Secure mobile ad hoc networks and sensors
- Sprache
- Englisch
- Autor*innen
- Mike Burmester
- Verlag
- Springer
- Erscheinungsdatum
- 2006
- ISBN10
- 3540366466
- ISBN13
- 9783540366461
- Reihe
- Lecture notes in computer science
- Kategorie
- Skripten & Universitätslehrbücher
- Beschreibung
- InhaltsverzeichnisMobile Ad-Hoc Networks and Sensors.Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.Key Management for Mobile Sensor Networks.Server-Aided RSA Key Generation Against Collusion Attack.Hybrid Approach for Secure Mobile Agent Computations.An XML Standards Based Authorization Framework for Mobile Agents.Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.Detecting Impersonation Attacks in Future Wireless and Mobile Networks.Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.“Fair” Authentication in Pervasive Computing.Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.ARMS: An Authenticated Routing Message in Sensor Networks.Security Analysis and Improvement of Return Routability Protocol.Dark Encounter Computations.Panel: Authentication in Constrained Environments.