| 000 | 03436nam a22005775i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-11526-4 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084531.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642115264 _9978-3-642-11526-4 |
||
| 024 | 7 |
_a10.1007/978-3-642-11526-4 _2doi |
|
| 050 | 4 | _aTK5105.5-5105.9 | |
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aCOM075000 _2bisacsh |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aGu, Qijun. _eeditor. |
|
| 245 | 1 | 0 |
_aSecurity in Emerging Wireless Communication and Networking Systems _h[electronic resource] : _bFirst International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers / _cedited by Qijun Gu, Wanyu Zang, Meng Yu. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 | _bonline resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v42 |
|
| 505 | 0 | _aSession 1 - Session Chair: Nikolaos Preve -- A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security -- Enhanced Access Polynomial Based Self-healing Key Distribution -- Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments -- Session 2 - Session Chair: Theofilos Chrysikos -- RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks -- Integrating Wireless Sensor Networks with Computational Grids -- Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos -- Signalprint-Based Intrusion Detection in Wireless Networks. | |
| 520 | _aThis book constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September 2009. The workshop emphasizes on new ideas for secure architectures and protocols to enhance the emerging wireless systems. The 7 selected full papers cover topics on applied cryptography, key management, vulnerability analysis, privacy, authentication, and intrusion detection for emerging wireless systems. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer network architectures. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData structures (Computer science). | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aCoding theory. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aCoding and Information Theory. |
| 650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
| 650 | 2 | 4 | _aComputer Systems Organization and Communication Networks. |
| 700 | 1 |
_aZang, Wanyu. _eeditor. |
|
| 700 | 1 |
_aYu, Meng. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642115257 |
| 830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v42 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-11526-4 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c111871 _d111871 |
||