語系/ Language:
繁體中文
English
KMU OLIS
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security, privacy, trust, and resour...
~
Rawat, Danda B. (1977-)
Security, privacy, trust, and resource management in mobile and wireless communications
紀錄類型:
書目-語言資料,印刷品 : 單行本
其他作者:
YanGongjun, 1976-
其他作者:
BistaBhed B., 1967-
其他作者:
RawatDanda B., 1977-
其他團體作者:
IGI Global
面頁冊數:
PDFs (510 pages)
標題:
Computer networks - Security measures. -
標題:
Mobile communication systems - Security measures. -
標題:
Wireless communication systems - Security measures. -
標題:
Collaboration computing systems
標題:
Design and analysis of cryptographic algorithms
標題:
Economics of privacy and security
標題:
Privacy, trust, and security architectures and protocols
標題:
Resource management
標題:
Web and web services security
標題:
Wireless access networks
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4691-9
附註:
Content Type: text
摘要註:
"This book examines the current scope of theoretical and practical applications on the security of mobile and wireless communications, covering fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks"--Provided by publisher.
ISBN:
9781466646926
內容註:
ntroduction to mobile and wireless communications networks / Danda B. Rawat, Bhed Bahadur Bista, Gongjun Yan Security in wireless metropolitan area networks: WiMAX and LTE / Lei Chen, Cihan Varol, Qingzhong Liu, Bing Zhou Physical layer security and its applications: a survey / Rajesh K. Sharma Physical layer security in wireless communication networks / Özge Cepheli, Günes Karabulut Kurt Security and connectivity analysis in vehicular communication networks / Hamada Alshaer, Sami Muhaidat, Raed Shubair, Moein Shayegannia Location security in vehicular wireless networks / Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista, Lei Chen Misbehavior detection in VANET: a survey / Shefali Jain, Anish Mathuria, Manik Lal Das Intrusion detection in vehicular ad-hoc networks on lower layers / Chong Han, Sami Muhaidat, Ibrahim Abualhaol, Mehrdad Dianati, Rahim Tafazolli Security issues in mobile ad hoc networks: a survey / Sunil Kumar, Kamlesh Dutta Security and privacy in mobile ad hoc social networks / Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi A multi-parameter trust framework for mobile ad hoc networks / Ji Guo, Alan Marshall, Bosheng Zhou Trust management and modeling techniques in wireless communications / Revathi Venkataraman, M. Pushpalatha, T. Rama Rao Privacy protection in vehicular ad-hoc networks / Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista, Wu He, Awny Alnusair Security challenges in wireless sensor network / Meenakshi Tripathi, M.S. Gaur, V.Laxmi Voting median base algorithm for measurement approximation of wireless sensor network performance / Nazar Elfadil, Yaqoob J. Al-Raisi Mobile cloud computing and its security and privacy challenges / Hassan Takabi, Saman Taghavi Zargar, James B. D. Joshi State of the art for near field communication: security and privacy within the field / Maria Moloney Modeling and verification of cooperation incentive mechanisms in user-centric wireless communications / Alessandro Aldini, Alessandro Bogliolo Seamless mobility management: a need for next generation all-IP wireless networks / Sulata Mitra 900MHz spectrum refarming analysis for UMTS900 deployment / Chitra Singh Budhathoki Magar.
Security, privacy, trust, and resource management in mobile and wireless communications
Security, privacy, trust, and resource management in mobile and wireless communications
/ Danda B. Rawat, Bhed B. Bista, and Gongjun Yan, editors. - PDFs (510 pages).
ntroduction to mobile and wireless communications networks / Danda B. Rawat, Bhed Bahadur Bista, Gongjun Yan.
Content Type: textMedia type: electronicCarrier type: online resourceRestricted to subscribers or individual electronic text purchasers..
Includes bibliographical references..
ISBN 9781466646926ISBN 9781466646919ISBN 9781466646933
Computer networksMobile communication systemsWireless communication systems -- Security measures. -- Security measures. -- Security measures.
Collaboration computing systemsDesign and analysis of cryptographic algorithmsEconomics of privacy and securityPrivacy, trust, and security architectures and protocolsResource managementWeb and web services securityWireless access networks
Yan, Gongjun
Security, privacy, trust, and resource management in mobile and wireless communications
LDR
:04211nam a2200457 450
001
288646
005
20131024123849.0
009
a(CaBNVSL)gtp00557203
009
a(OCoLC)861448006
009
00000215
010
1
$a
9781466646926
$b
ebook
010
1
$a
9781466646919
$b
hardcover
010
1
$a
9781466646933
$b
print & perpetual access
012
0
$a
10.4018/978-1-4666-4691-9
020
$b
2013025029
100
$a
20151127d2014 y0engy50 b
102
$a
us
105
$a
y a 000yy
200
1
$a
Security, privacy, trust, and resource management in mobile and wireless communications
$f
Danda B. Rawat, Bhed B. Bista, and Gongjun Yan, editors.
215
1
$a
PDFs (510 pages)
300
$a
Content Type: text
300
$a
Media type: electronic
300
$a
Carrier type: online resource
300
$a
Restricted to subscribers or individual electronic text purchasers.
301
$a
10.4018/978-1-4666-4691-9
310
$a
Also available in print.
320
$a
Includes bibliographical references.
327
1
$a
ntroduction to mobile and wireless communications networks / Danda B. Rawat, Bhed Bahadur Bista, Gongjun Yan
$a
Security in wireless metropolitan area networks: WiMAX and LTE / Lei Chen, Cihan Varol, Qingzhong Liu, Bing Zhou
$a
Physical layer security and its applications: a survey / Rajesh K. Sharma
$a
Physical layer security in wireless communication networks / Özge Cepheli, Günes Karabulut Kurt
$a
Security and connectivity analysis in vehicular communication networks / Hamada Alshaer, Sami Muhaidat, Raed Shubair, Moein Shayegannia
$a
Location security in vehicular wireless networks / Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista, Lei Chen
$a
Misbehavior detection in VANET: a survey / Shefali Jain, Anish Mathuria, Manik Lal Das
$a
Intrusion detection in vehicular ad-hoc networks on lower layers / Chong Han, Sami Muhaidat, Ibrahim Abualhaol, Mehrdad Dianati, Rahim Tafazolli
$a
Security issues in mobile ad hoc networks: a survey / Sunil Kumar, Kamlesh Dutta
$a
Security and privacy in mobile ad hoc social networks / Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi
$a
A multi-parameter trust framework for mobile ad hoc networks / Ji Guo, Alan Marshall, Bosheng Zhou
$a
Trust management and modeling techniques in wireless communications / Revathi Venkataraman, M. Pushpalatha, T. Rama Rao
$a
Privacy protection in vehicular ad-hoc networks / Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista, Wu He, Awny Alnusair
$a
Security challenges in wireless sensor network / Meenakshi Tripathi, M.S. Gaur, V.Laxmi
$a
Voting median base algorithm for measurement approximation of wireless sensor network performance / Nazar Elfadil, Yaqoob J. Al-Raisi
$a
Mobile cloud computing and its security and privacy challenges / Hassan Takabi, Saman Taghavi Zargar, James B. D. Joshi
$a
State of the art for near field communication: security and privacy within the field / Maria Moloney
$a
Modeling and verification of cooperation incentive mechanisms in user-centric wireless communications / Alessandro Aldini, Alessandro Bogliolo
$a
Seamless mobility management: a need for next generation all-IP wireless networks / Sulata Mitra
$a
900MHz spectrum refarming analysis for UMTS900 deployment / Chitra Singh Budhathoki Magar.
330
$a
"This book examines the current scope of theoretical and practical applications on the security of mobile and wireless communications, covering fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks"--Provided by publisher.
337
$a
Mode of access: World Wide Web.
452
1
$1
001(DLC)2013025029
452
1
$1
300
$a
Print version:
$1
001(DLC) 2013025029
$1
0101
$a
1466646918; 9781466646919
606
$a
Computer networks
$x
Security measures.
$2
lc
$3
385022
606
$a
Mobile communication systems
$x
Security measures.
$2
lc
$3
385063
606
$a
Wireless communication systems
$x
Security measures.
$2
lc
$3
385062
610
1
$a
Collaboration computing systems
610
1
$a
Design and analysis of cryptographic algorithms
610
1
$a
Economics of privacy and security
610
1
$a
Privacy, trust, and security architectures and protocols
610
1
$a
Resource management
610
1
$a
Web and web services security
610
1
$a
Wireless access networks
676
$a
005.8
$v
23
680
$a
TK5103.2
$b
.S444 2014e
702
1
$a
Yan
$b
Gongjun
$f
1976-
$4
editor.
$3
385061
702
1
$a
Bista
$b
Bhed B.
$f
1967-
$4
editor.
$3
385060
702
1
$a
Rawat
$b
Danda B.
$f
1977-
$4
editor.
$3
385059
712
0 2
$a
IGI Global
$4
publisher.
$3
384552
856
7
$2
http
$3
Chapter PDFs via platform
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4691-9
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
處理中
...
變更密碼
登入
請輸入帳號密碼
帳號(必備)
(請輸入學號/職號)
.
密碼
(請輸入學校電子郵件密碼)
.
本校和附屬機構教職員工生,可透過校務資訊系統【快速登入區】進行登入,不用再認證。
校內教職員工及學生
帳號:學號/職號;密碼:本校電子信箱密碼
附屬機構醫事人員、其他非編制內教職員工
帳號:職號;密碼:身份證號共10碼,英文字母大寫
校友及外校實習生
帳號:借書證上之條碼號;密碼:請點選忘記密碼重新設定
如有任何問題歡迎洽詢圖書館流通櫃台(分機2133*83;read@kmu.edu.tw),謝謝。
~請尊重智慧財產權,勿非法影印~
Login information for International Students: *Username: Student ID Password: KMU Email Password
If you have any question, please contact us. (Tel : 07-3121101#2133#83; Email: read@kmu.edu.tw)
~Please respect the Intellectual Property Rights, do not use illegal copies of textbooks ~
請在此電腦上記得個人資料
取消
忘記密碼? Forgot your password? (請注意!您必須已在系統登記E-mail信箱方能使用。且忘記密碼功能不適用校院內教職員及學生)