Welcome
Copyright © SirsiDynix. All rights reserved.
(Build horizon-8.0.1.5407)
Center Of Excellence for Jordanian Public University Library System (COE-JOPULS)
العربية (السعودية)
English (United States)
Log in
Help
Welcome
Jordanian Union Catalogue
360 Search
Search Libraries Catalogue
Simple
Advanced
Power
Community Resource
Search History
My List
My Account
Search
Options
Refine
Start Over
Show details
Hide details
Duplicate Items
Add to My List
Print
Sorts and Limits
Sorts:
None
Author
Publication Date
Publisher
Subject
Title
Title:
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing / Levente Buttyan, Jean-Pierre Hubaux.
Author:
Butty�an, Levente.
Hubaux, Jean-Pierre.
Hubaux, Jean-Pierre.
General Notes:
Includes bibliographical references and index.
pt. I: Introduction -- pt. II: Thwarting Malicious Behavior -- pt. III: Thwarting Selfish Behavior.
"As wireless networking becomes almost ubiquitous, it is important to anticipate potential malicious and selfish misdeeds. This self-contained text is the first to provide a scholarly description of security and non-cooperative behavior in wireless networks." "The major networking trends are analyzed and their implications explained in terms of security and cooperation. Key problems such as cheating with identities, illegitimate access to confidential data, attacks against privacy and "stealing of bandwidth" are described along with the existing security techniques and putative methods of protection for the future. The fundamental questions of security: user and device identification; establishment of security associations; secure and cooperative routing in multi-hop network; fair bandwidth distribution; privacy protection, and so on, are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor and RFID networks. The important relationships between trust, security, and cooperation are also discussed." "End of chapter homework problems test the reader and open new directions of thought; and two tutorials in the appendices, on cryptographic protocols and game theory, provide a review of the background material required to grasp the core concepts." "Ideal for senior undergraduates and graduate students of electrical engineering and computer science, this book will also be an invaluable resource on thwarting malicious and selfish behavior for researchers and practitioners in the wireless industry."--Jacket.
Publisher:
Cambridge University Press,
Publication Place:
Cambridge :
ISBN:
9780521873710
0521873711
Subject:
Wireless communication systems -- Security measures.
Computer networks -- Security measures.
R�eseaux d'ordinateurs -- S�ecurit�e -- Mesures.
S�ecurit�e informatique.
Cryptographie.
Criminalit�e informatique.
Syst�emes informatiques -- S�ecurit�e -- Mesures.
Computer networks -- Security measures.
Wireless communication systems -- Security measures.
Contents:
pt. I: Introduction -- pt. II: Thwarting Malicious Behavior -- pt. III: Thwarting Selfish Behavior.
Physical Description:
xvii, 485 pages : illustrations ;
Electronic Location:
http://catdir.loc.gov/catdir/enhancements/fy0808/2008295154-t.html
http://catdir.loc.gov/catdir/enhancements/fy0808/2008295154-b.html
http://catdir.loc.gov/catdir/enhancements/fy0808/2008295154-d.html
Publication Date:
2008.
Results 1 - 2 of 2
Agency:
Collection:
Call No.:
Item Type:
Status:
Copy:
Item Notes:
Barcode:
Media Type:
Balqa
General
005.4 B 8758
Normal Circulation
Available
1
BU201017863
Book
JUST Main Library
General
TK5102.85 .B88 2008
Normal Circulation
Available
1
(الكتاب موجود في الطابق الثاني - الرف رقم293 )
ST132423
Book