Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
86,15 €*
Versandkostenfrei per Post / DHL
Lieferzeit 2-3 Wochen
Kategorien:
Beschreibung
The first self-contained text to consider security and non-cooperative behavior in wireless networks.
The first self-contained text to consider security and non-cooperative behavior in wireless networks.
Über den Autor
Levente Buttyán is an Associate Professor at the Department of Telecommunications, Budapest University of Technology and Economics (BME), Hungary.
Inhaltsverzeichnis
Part I. Introduction: 1. The security of existing wireless networks; 2. Upcoming wireless networks and new challenges; 3. Trust assumptions and adversary models; Part II. Thwarting Malicious Behavior: 4. Naming and addressing; 5. Establishment of security associations; 6. Securing neighbor discovery; 7. Secure routing in multi-hop wireless networks; 8. Privacy protection; Part III. Thwarting Selfish Behavior: 9. Selfish behavior at the MAC layer of CSMA/CA; 10. Selfishness in packet forwarding; 11. Wireless operators in a shared spectrum; 12. Secure protocols for behavior enforcement; Appendices: A. Introduction to cryptographic algorithms and protocols; B. A tutorial on game theory for wireless networks; Bibliography; Index.
Details
Erscheinungsjahr: | 2007 |
---|---|
Fachbereich: | Allgemeines |
Genre: | Technik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Seiten: | 504 |
ISBN-13: | 9780521873710 |
ISBN-10: | 0521873711 |
Sprache: | Englisch |
Ausstattung / Beilage: | HC gerader Rücken kaschiert |
Einband: | Gebunden |
Autor: |
Buttyán, Levente
Hubaux, Jean-Pierre |
Hersteller: | Cambridge University Press |
Maße: | 250 x 175 x 31 mm |
Von/Mit: | Levente Buttyán (u. a.) |
Erscheinungsdatum: | 29.11.2007 |
Gewicht: | 1,042 kg |
Über den Autor
Levente Buttyán is an Associate Professor at the Department of Telecommunications, Budapest University of Technology and Economics (BME), Hungary.
Inhaltsverzeichnis
Part I. Introduction: 1. The security of existing wireless networks; 2. Upcoming wireless networks and new challenges; 3. Trust assumptions and adversary models; Part II. Thwarting Malicious Behavior: 4. Naming and addressing; 5. Establishment of security associations; 6. Securing neighbor discovery; 7. Secure routing in multi-hop wireless networks; 8. Privacy protection; Part III. Thwarting Selfish Behavior: 9. Selfish behavior at the MAC layer of CSMA/CA; 10. Selfishness in packet forwarding; 11. Wireless operators in a shared spectrum; 12. Secure protocols for behavior enforcement; Appendices: A. Introduction to cryptographic algorithms and protocols; B. A tutorial on game theory for wireless networks; Bibliography; Index.
Details
Erscheinungsjahr: | 2007 |
---|---|
Fachbereich: | Allgemeines |
Genre: | Technik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Buch |
Seiten: | 504 |
ISBN-13: | 9780521873710 |
ISBN-10: | 0521873711 |
Sprache: | Englisch |
Ausstattung / Beilage: | HC gerader Rücken kaschiert |
Einband: | Gebunden |
Autor: |
Buttyán, Levente
Hubaux, Jean-Pierre |
Hersteller: | Cambridge University Press |
Maße: | 250 x 175 x 31 mm |
Von/Mit: | Levente Buttyán (u. a.) |
Erscheinungsdatum: | 29.11.2007 |
Gewicht: | 1,042 kg |
Warnhinweis