Coverart for item
The Resource Handbook of research on wireless security, Yan Zhang, Jun Zheng, Miao Ma [editors]

Handbook of research on wireless security, Yan Zhang, Jun Zheng, Miao Ma [editors]

Label
Handbook of research on wireless security
Title
Handbook of research on wireless security
Statement of responsibility
Yan Zhang, Jun Zheng, Miao Ma [editors]
Contributor
Subject
Language
eng
Summary
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society. This handbook combines research from over 100 experts from 23 countries on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. It is an innovative and current reference source for students, educators, faculty members, researchers, and engineers in the field of wireless security
Additional physical form
Also available in print
Dewey number
005.8
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1962-
http://library.link/vocab/relatedWorkOrContributorName
  • Zhang, Yan
  • Zheng, Jun
  • Ma, Miao
  • IGI Global
http://library.link/vocab/subjectName
Wireless communication systems
Target audience
  • adult
  • specialized
Label
Handbook of research on wireless security, Yan Zhang, Jun Zheng, Miao Ma [editors]
Instantiates
Publication
Note
Title from PDF title page (viewed June 16, 2010)
Bibliography note
Includes bibliographical references and index
Contents
  • Malicious Software in Mobile Devices / Thomas M. Chen, Cyrus Peikari -- Secure Service Discovery / Sheikh I. Ahamed [and others] -- Security of Mobile Code / Zbigniew Kotulski, Aneta Zwierko -- Identity Management / Kumbesan Sandrasegaran, Mo Li -- Wireless Wardriving / Luca Caviglione -- Intrusion and Anomaly Detection in Wireless Networks / Amel Meddeb Makhlouf, Noureddine Boudriga -- Peer-to-Peer (P2P) Network Security: Firewall Issues / Lu Yan -- Identity Management for Wireless Service Access / Mohammad M.R. Chowdhury, Josef Noll -- Privacy Enhancing Techniques: A Survey and Classification / Peter Langendörfer [and others] -- Vulnerability Analysis and Defenses in Wireless Networks / Lawan A. Mohammad, Biju Issac -- Key Distribution and Management for Mobile Applications / György Kálmán, Josef Noll -- Architecture and Protocols for Authentications, Authorization, and Accounting (AAA) in the Future Wireless Communications Networks / Said Zaghloul, Admela Jukan -- Authentication, Authorisation, and Access Control in Mobile Systems / Josef Noll, György Kálmán -- Trustworthy Networks, Authentication, Privacy, and Security Models / Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga -- The Provably Secure Formal Methods for Authentication and Key Agreement Protocols / Jianfeng Ma, Xinghua Li -- Multimedia Encryption and Watermarking in Wireless Environment / Shiguo Lian -- System-on-Chip Design of the Whirlpool Hash Function / Paris Kitsos
  • Security in 4G / Artur Hecker, Mohamad Badra -- Security Architectures for B3G Mobile Networks / Christoforos Ntantogian, Christos Xenakis -- Security in UMTS 3G Mobile Networks / Christos Xenakis -- Access Security in UMTS and IMS / Yan Zhang [and others] -- Security in 2.5G Mobile Systems / Christos Xenakis -- End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies / Sasan Adibi, Gordon B. Agnew -- Generic Application Security in Current and Future Networks / Silke Holtmanns, Pekka Laitinen -- Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments / Sangheon Pack [and others] -- Security in Mobile Ad Hoc Networks / Bin Lu -- Privacy and Anonymity in Mobile Ad Hoc Networks / Christer Andersson, Leonardo A. Martucci, Simone Fischer-Hübner -- Secure Routing with Reputation in MANET / Tomasz Ciszkowski, Zbigniew Kotulski -- Trust Management and Context-Driven Access Control / Paolo Bellavista [and others] -- A Survey of Key Management in Mobile Ad Hoc Networks / Bing Wu, Jie Wu, Mihaela Cardei -- Security Measures for Mobile Ad-Hoc Networks (MANETs) / Sasan Adibi, Gordon B. Agnew -- A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks / Hao Yin [and others] -- Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks / John Felix Charles Joseph [and others] -- Security in Wireless Sensor Networks / Luis E. Palafox, J. Antonio Garcia-Macias -- Security and Privacy in Wireless Sensor Networks: Challenges and Solutions / Mohamed Hamdi, Noreddine Boudriga
  • Routing Security in Wireless Sensor Networks / A.R. Naseer, Ismat K. Maarouf, Ashraf S. Hasan -- Localization Security in Wireless Sensor Networks / Yawen Wei, Zhen Yu, Yong Guan -- Resilience Against False Data Injection Attack in Wireless Sensor Networks / Miao Ma -- Survivability of Sensors with Key and Trust Management / Jean-Marc Seigneur, Luminita Moraru, Olivier Powell -- Fault Tolerant Topology Design for Ad Hoc and Sensor Networks / Yu Wang -- Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections / Georgios Kambourakis, Angelos Rouskas, Stefanos Gritzalis -- Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring / Miguel A. Ruiz [and others] -- Security in WLAN / Mohamad Badra, Artur Hecker -- Access Control in Wireless Local Area Networks: Fast Authentication Schemes / Jahan Hassan, Björn Landfeldt, Albert Y. Zomaya -- Security and Privacy in RFID Based Wireless Networks / Denis Trcek -- Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANS) / Giorgos Kostopoulos, Nicolas Sklavos, Odysseas Koufopavlou -- End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications / Sasan Adibi, Gordon B. Agnew, Tom Tofigh -- Evaluation of Security Architectures for Mobile Broadband Access / Symeon Chatzinotas -- Extensible Authentication (EAP) Protocol Integrations in the Next Generation Cellular Networks / Sasan Adibi, Gordon B. Agnew
Control code
ocn707610723
Extent
electronic texts (860 pages : illustrations)
Form of item
electronic
Isbn
9781599049007
Other control number
10.4018/978-1-59904-899-4
Other physical details
digital files
Reproduction note
Electronic reproduction.
System control number
(OCoLC)707610723
System details
Mode of access: Internet
Label
Handbook of research on wireless security, Yan Zhang, Jun Zheng, Miao Ma [editors]
Publication
Note
Title from PDF title page (viewed June 16, 2010)
Bibliography note
Includes bibliographical references and index
Contents
  • Malicious Software in Mobile Devices / Thomas M. Chen, Cyrus Peikari -- Secure Service Discovery / Sheikh I. Ahamed [and others] -- Security of Mobile Code / Zbigniew Kotulski, Aneta Zwierko -- Identity Management / Kumbesan Sandrasegaran, Mo Li -- Wireless Wardriving / Luca Caviglione -- Intrusion and Anomaly Detection in Wireless Networks / Amel Meddeb Makhlouf, Noureddine Boudriga -- Peer-to-Peer (P2P) Network Security: Firewall Issues / Lu Yan -- Identity Management for Wireless Service Access / Mohammad M.R. Chowdhury, Josef Noll -- Privacy Enhancing Techniques: A Survey and Classification / Peter Langendörfer [and others] -- Vulnerability Analysis and Defenses in Wireless Networks / Lawan A. Mohammad, Biju Issac -- Key Distribution and Management for Mobile Applications / György Kálmán, Josef Noll -- Architecture and Protocols for Authentications, Authorization, and Accounting (AAA) in the Future Wireless Communications Networks / Said Zaghloul, Admela Jukan -- Authentication, Authorisation, and Access Control in Mobile Systems / Josef Noll, György Kálmán -- Trustworthy Networks, Authentication, Privacy, and Security Models / Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga -- The Provably Secure Formal Methods for Authentication and Key Agreement Protocols / Jianfeng Ma, Xinghua Li -- Multimedia Encryption and Watermarking in Wireless Environment / Shiguo Lian -- System-on-Chip Design of the Whirlpool Hash Function / Paris Kitsos
  • Security in 4G / Artur Hecker, Mohamad Badra -- Security Architectures for B3G Mobile Networks / Christoforos Ntantogian, Christos Xenakis -- Security in UMTS 3G Mobile Networks / Christos Xenakis -- Access Security in UMTS and IMS / Yan Zhang [and others] -- Security in 2.5G Mobile Systems / Christos Xenakis -- End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies / Sasan Adibi, Gordon B. Agnew -- Generic Application Security in Current and Future Networks / Silke Holtmanns, Pekka Laitinen -- Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments / Sangheon Pack [and others] -- Security in Mobile Ad Hoc Networks / Bin Lu -- Privacy and Anonymity in Mobile Ad Hoc Networks / Christer Andersson, Leonardo A. Martucci, Simone Fischer-Hübner -- Secure Routing with Reputation in MANET / Tomasz Ciszkowski, Zbigniew Kotulski -- Trust Management and Context-Driven Access Control / Paolo Bellavista [and others] -- A Survey of Key Management in Mobile Ad Hoc Networks / Bing Wu, Jie Wu, Mihaela Cardei -- Security Measures for Mobile Ad-Hoc Networks (MANETs) / Sasan Adibi, Gordon B. Agnew -- A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks / Hao Yin [and others] -- Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks / John Felix Charles Joseph [and others] -- Security in Wireless Sensor Networks / Luis E. Palafox, J. Antonio Garcia-Macias -- Security and Privacy in Wireless Sensor Networks: Challenges and Solutions / Mohamed Hamdi, Noreddine Boudriga
  • Routing Security in Wireless Sensor Networks / A.R. Naseer, Ismat K. Maarouf, Ashraf S. Hasan -- Localization Security in Wireless Sensor Networks / Yawen Wei, Zhen Yu, Yong Guan -- Resilience Against False Data Injection Attack in Wireless Sensor Networks / Miao Ma -- Survivability of Sensors with Key and Trust Management / Jean-Marc Seigneur, Luminita Moraru, Olivier Powell -- Fault Tolerant Topology Design for Ad Hoc and Sensor Networks / Yu Wang -- Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections / Georgios Kambourakis, Angelos Rouskas, Stefanos Gritzalis -- Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring / Miguel A. Ruiz [and others] -- Security in WLAN / Mohamad Badra, Artur Hecker -- Access Control in Wireless Local Area Networks: Fast Authentication Schemes / Jahan Hassan, Björn Landfeldt, Albert Y. Zomaya -- Security and Privacy in RFID Based Wireless Networks / Denis Trcek -- Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANS) / Giorgos Kostopoulos, Nicolas Sklavos, Odysseas Koufopavlou -- End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications / Sasan Adibi, Gordon B. Agnew, Tom Tofigh -- Evaluation of Security Architectures for Mobile Broadband Access / Symeon Chatzinotas -- Extensible Authentication (EAP) Protocol Integrations in the Next Generation Cellular Networks / Sasan Adibi, Gordon B. Agnew
Control code
ocn707610723
Extent
electronic texts (860 pages : illustrations)
Form of item
electronic
Isbn
9781599049007
Other control number
10.4018/978-1-59904-899-4
Other physical details
digital files
Reproduction note
Electronic reproduction.
System control number
(OCoLC)707610723
System details
Mode of access: Internet

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...