TAILIEUCHUNG - Wireless Network Security - YANG XIAO vs XUEMIN SHEN

Although the covered topics may not be an exhaustive representation of all the security issues in wireless/mobile networks, they do represent a rich and useful sample of the strategies and contents. This book has been made possible by the great efforts and contributions of many people. First of all, we would like to thank all the contributors for putting together excellent chapters that are very comprehensive and informative. Second, we would like to thank all the reviewers for their valuable suggestions and comments which have greatly enhanced the quality of this book. Third, we would like to thank the staff members from Springer, for putting this book together | Wireless Network Security YANG XIAO XUEMIN SHEN and DING-ZHU DU Springer Editors Yang Xiao Department of Computer Science University of Alabama 101 Houser Hall Xuemin Sherman Shen Department of Electrical Computer Engineering University of Waterloo Waterloo Ontario Canada N2L 3G1 Tuscaloosa AL 35487 Ding-Zhu Du Department of Computer Science Engineering University of Texas at Dallas Richardson TX 75093 Wireless Network Security Library of Congress Control Number 2006922217 ISBN-10 0-387-28040-5 e-ISBN-10 0-387-33112-3 ISBN-13 978-0-387-28040-0 e-ISBN-13 978-0-387-33112-6 Printed on acid-free paper. 2007 Springer Science Business Media LLC All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher Springer Science Business Media LLC 233 Spring Street New York NY 10013 USA except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval electronic adaptation computer software or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names trademarks service marks and similar terms even if they are not identified as such is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. 9 8 7 6 5 4 3 2 1 CONTENTS Preface vii Yang Xiao Xuemin Shen and Ding-Zhu Du Part I Security in General Wireless Mobile Networks 1 Chapter 1 High Performance Elliptic Curve Cryptographic Co-processor 3 Jonathan Lutz and M. Anwarul Hasan Chapter 2 An Adaptive Encryption Protocol in Mobile Computing 43 Hanping Lufei and Weisong Shi Part II Security in Ad Hoc Network 63 Chapter 3 Pre-Authentication and Authentication Models in Ad Hoc Networks 65 Katrin Hoeper and Guang Gong Chapter 4 Promoting Identity-Based Key Management in Wireless Ad Hoc Networks 83 Jianping Pan Lin Cai and Xuemin Sherman Shen Chapter 5 A Survey of .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.