Security And Cooperation In Wireless Networks (Record no. 578720)

MARC details
000 -LEADER
fixed length control field 02343nam a22002297a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250806b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780521873710
Paper back/Hardbound hbk
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number BUT
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Buttyán, Levente
245 ## - TITLE STATEMENT
Title Security And Cooperation In Wireless Networks
Sub Title : thwarting malicious and selfish behavior in the age of ubiquitous computing
Statement of responsibility, etc Levente Buttyán, Jean-Pierre Hubaux
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Cambridge
Name of publisher Cambridge University Press
Year of publication 2008
300 ## - PHYSICAL DESCRIPTION
Number of Pages xvii, 485 pages
Other physical details ill.
Dimensions 25 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographies and index
520 ## - SUMMARY, ETC.
Summary, etc As wireless networking becomes almost ubiquitous, it is important to anticipate potential malicious and selfish misdeeds. This self-contained text is the first to provide a scholarly description of security and non-cooperative behavior in wireless networks." "The major networking trends are analyzed and their implications explained in terms of security and cooperation. Key problems such as cheating with identities, illegitimate access to confidential data, attacks against privacy and "stealing of bandwidth" are described along with the existing security techniques and putative methods of protection for the future. The fundamental questions of security: user and device identification; establishment of security associations; secure and cooperative routing in multi-hop network; fair bandwidth distribution; privacy protection, and so on, are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor and RFID networks. The important relationships between trust, security, and cooperation are also discussed." "End of chapter homework problems test the reader and open new directions of thought; and two tutorials in the appendices, on cryptographic protocols and game theory, provide a review of the background material required to grasp the core concepts." "Ideal for senior undergraduates and graduate students of electrical engineering and computer science, this book will also be an invaluable resource on thwarting malicious and selfish behavior for researchers and practitioners in the wireless industry.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Omputer Security
Topical Term computer networks Security measures
Topical Term Computer crimes
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Hubaux, Jean-pierre
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Reference
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Full call number Accession Number Price effective from Koha item type
        Anna Centenary Library Anna Centenary Library 3RD FLOOR, A WING 28.07.2010 005.8 BUT 95726 06.08.2025 Reference

Find us on the map