2009, ISBN: 9783642052842
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revis… Mehr…
Springer.com new in stock. Versandkosten:zzgl. Versandkosten. (EUR 0.00) Details... |
2009, ISBN: 9783642052842
5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, eBooks, eBook Download (PDF), Auflage, [PU: Springer Berlin Heidelberg]… Mehr…
lehmanns.de Versandkosten:Download sofort lieferbar. (EUR 0.00) Details... |
2009, ISBN: 9783642052842
5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, [ED: 1], Auflage, eBook Download (PDF), eBooks, [PU: Springer Berlin He… Mehr…
lehmanns.de Versandkosten:Download sofort lieferbar, , Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
2009, ISBN: 9783642052842
5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, eBooks, eBook Download (PDF), Auflage, [PU: Springer-Verlag], Springer-… Mehr…
lehmanns.de Versandkosten:Download sofort lieferbar. (EUR 0.00) Details... |
2009, ISBN: 9783642052842
5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, [ED: 1], Auflage, eBook Download (PDF), eBooks, [PU: Springer-Verlag]
lehmanns.de Versandkosten:Download sofort lieferbar, , No shipping costs within Germany. (EUR 9.95) Details... |
2009, ISBN: 9783642052842
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revis… Mehr…
Yan Chen; Tassos D. Dimitriou; Jianying Zhou:
Security and Privacy in Communication Networks - Erstausgabe2009, ISBN: 9783642052842
5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, eBooks, eBook Download (PDF), Auflage, [PU: Springer Berlin Heidelberg]… Mehr…
2009
ISBN: 9783642052842
5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, [ED: 1], Auflage, eBook Download (PDF), eBooks, [PU: Springer Berlin He… Mehr…
2009, ISBN: 9783642052842
5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, eBooks, eBook Download (PDF), Auflage, [PU: Springer-Verlag], Springer-… Mehr…
2009, ISBN: 9783642052842
5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, [ED: 1], Auflage, eBook Download (PDF), eBooks, [PU: Springer-Verlag]
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Security and Privacy in Communication Networks
EAN (ISBN-13): 9783642052842
ISBN (ISBN-10): 3642052843
Erscheinungsjahr: 2009
Herausgeber: Springer-Verlag
13 Seiten
Sprache: eng/Englisch
Buch in der Datenbank seit 2008-11-10T03:26:33+01:00 (Vienna)
Detailseite zuletzt geändert am 2022-12-08T11:47:16+01:00 (Vienna)
ISBN/EAN: 9783642052842
ISBN - alternative Schreibweisen:
3-642-05284-3, 978-3-642-05284-2
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: tassos, tasso, eds, zhou chen
Titel des Buches: network security, privacy right, communication networks security
Daten vom Verlag:
Autor/in: Yan Chen; Tassos D. Dimitriou; Jianying Zhou
Titel: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers
Verlag: Springer; Springer Berlin
460 Seiten
Erscheinungsjahr: 2009-10-13
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIII, 460 p.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Broadcast; Internet; LA; MANET; WLAN jamming; classification; cryptography; ePassports; fraud detection; hash function; hash functions; network filtering; network management; sensor networks; spam filtering; C; Computer Communication Networks; Programming Techniques; Data and Information Security; Cryptology; Data Structures and Information Theory; Computer Science; Computerprogrammierung und Softwareentwicklung; Computersicherheit; Netzwerksicherheit; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Algorithmen und Datenstrukturen; Informationstheorie; BC
Wireless Network Security I.- Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages.- FIJI: Fighting Implicit Jamming in 802.11 WLANs.- Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks.- Network Intrusion Detection.- Baiting Inside Attackers Using Decoy Documents.- MULAN: Multi-Level Adaptive Network Filter.- Automated Classification of Network Traffic Anomalies.- Security and Privacy for the General Internet.- Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets.- On the Security of Bottleneck Bandwidth Estimation Techniques.- An Eavesdropping Game with SINR as an Objective Function.- Malware and Misbehavior.- Ensemble: Community-Based Anomaly Detection for Popular Applications.- Using Failure Information Analysis to Detect Enterprise Zombies.- Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games.- Wireless Network Security II, Sensor Networks.- Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks.- Aggregated Authentication (AMAC) Using Universal Hash Functions.- Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.- Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.- Key Management, Credentials, Authentications.- User–Centric Identity Using ePassports.- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.- Breaking and Building of Group Inside Signature.- Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources.- Wireless Network Security III.- Self-organized Anonymous Authentication in Mobile Ad Hoc Networks.- An Active Global Attack Model for Sensor Source Location Privacy: Analysis andCountermeasures.- Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC.- Secure Multicast, Emerging Technologies.- A Novel Architecture for Secure and Scalable Multicast over IP Network.- Reliable Resource Searching in P2P Networks.- The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9781977829795 Security and Privacy in Communication Networks (Cavanaugh, James)
- 9781977829795 Security and Privacy in Communication Networks (Cavanaugh, James)
- 9783030017002 Security And Privacy In Communication Networks: 14th International Conference, Securecomm 2018, Singapore, Singapore, August 8-10, (Raheem Beyah; Bing Chang; Yingjiu Li; Sencun Zhu)
- 9783030017033 Security And Privacy In Communication Networks: 14th International Conference, Securecomm 2018, Singapore, Singapore, August 8-10, (Raheem Beyah; Bing Chang; Yingjiu Li; Sencun Zhu)
- 9781450304030 SIGDOC 10 Proceedings of the 28th ACM International Conference on Design of Communication (SIGDOC Conference Committee)
< zum Archiv...