This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the reader a good idea of the current state-of-the-art technologies in mobile and wireless network security and privacy.
This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the reader a good idea of the current state-of-the-art technologies in mobile and wireless network security and privacy.
Research Directions in Security and Privacy for Mobile and Wireless Networks.- Pervasive Systems: Enhancing Trust Negotiation with Privacy Support.- Applying Trust in Mobile and Wireless Networks.- A Framework for Computing Trust in Mobile Ad-Hoc Networks.- The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security.- On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks.- Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries.- Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions.- An Anonymous MAC Protocol for Wireless Ad-hoc Networks.- Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks.
Research Directions in Security and Privacy for Mobile and Wireless Networks.- Pervasive Systems: Enhancing Trust Negotiation with Privacy Support.- Applying Trust in Mobile and Wireless Networks.- A Framework for Computing Trust in Mobile Ad-Hoc Networks.- The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security.- On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks.- Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries.- Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions.- An Anonymous MAC Protocol for Wireless Ad-hoc Networks.- Hardware/Software Solution to Improve Security in Mobile Ad-hoc Networks.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309