000 03436nam a22005775i 4500
001 978-3-642-11526-4
003 DE-He213
005 20140220084531.0
007 cr nn 008mamaa
008 100301s2010 gw | s |||| 0|eng d
020 _a9783642115264
_9978-3-642-11526-4
024 7 _a10.1007/978-3-642-11526-4
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aGu, Qijun.
_eeditor.
245 1 0 _aSecurity in Emerging Wireless Communication and Networking Systems
_h[electronic resource] :
_bFirst International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers /
_cedited by Qijun Gu, Wanyu Zang, Meng Yu.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v42
505 0 _aSession 1 - Session Chair: Nikolaos Preve -- A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security -- Enhanced Access Polynomial Based Self-healing Key Distribution -- Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments -- Session 2 - Session Chair: Theofilos Chrysikos -- RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks -- Integrating Wireless Sensor Networks with Computational Grids -- Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos -- Signalprint-Based Intrusion Detection in Wireless Networks.
520 _aThis book constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September 2009. The workshop emphasizes on new ideas for secure architectures and protocols to enhance the emerging wireless systems. The 7 selected full papers cover topics on applied cryptography, key management, vulnerability analysis, privacy, authentication, and intrusion detection for emerging wireless systems.
650 0 _aComputer science.
650 0 _aComputer network architectures.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSystems and Data Security.
650 2 4 _aData Encryption.
650 2 4 _aCoding and Information Theory.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aComputer Systems Organization and Communication Networks.
700 1 _aZang, Wanyu.
_eeditor.
700 1 _aYu, Meng.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642115257
830 0 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v42
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-11526-4
912 _aZDB-2-SCS
999 _c111871
_d111871