Secure Mobile Ad-hoc Networks and Sensors
Springer Berlin (Verlag)
978-3-540-36646-1 (ISBN)
Mobile Ad-Hoc Networks and Sensors.- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.- Key Management for Mobile Sensor Networks.- Server-Aided RSA Key Generation Against Collusion Attack.- Hybrid Approach for Secure Mobile Agent Computations.- An XML Standards Based Authorization Framework for Mobile Agents.- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.- Detecting Impersonation Attacks in Future Wireless and Mobile Networks.- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.- "Fair" Authentication in Pervasive Computing.- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.- ARMS: An Authenticated Routing Message in Sensor Networks.- Security Analysis and Improvement of Return Routability Protocol.- Dark Encounter Computations.- Panel: Authentication in Constrained Environments.
Erscheint lt. Verlag | 24.7.2006 |
---|---|
Reihe/Serie | Computer Communication Networks and Telecommunications | Lecture Notes in Computer Science |
Zusatzinfo | X, 193 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 299 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Software Entwicklung ► Mobile- / App-Entwicklung | |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Ad-Hoc Networks • Algorithm analysis and problem complexity • authentication • Automata • computer network security • Cryptanalysis • cryptographic protocols • cryptography • Intrusion Detection • Key Management • Mobile Agents • Mobile Security • Network Security • pervasive networks • privacy • protocol attacks • Public Key Cryptography • RF devices • Routing • rsa • Secure Communications • Secure Networking • security • security architecture • sensor networks • SIGNATUR • Standards • Systems Security • wireless networks • XML |
ISBN-10 | 3-540-36646-6 / 3540366466 |
ISBN-13 | 978-3-540-36646-1 / 9783540366461 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich