Normal view MARC view ISBD view

Security in Emerging Wireless Communication and Networking Systems [electronic resource] : First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers / edited by Qijun Gu, Wanyu Zang, Meng Yu.

By: Gu, Qijun [editor.].
Contributor(s): Zang, Wanyu [editor.] | Yu, Meng [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: 42Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Description: online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642115264.Subject(s): Computer science | Computer network architectures | Computer Communication Networks | Data protection | Data structures (Computer science) | Data encryption (Computer science) | Coding theory | Computer Science | Computer Communication Networks | Systems and Data Security | Data Encryption | Coding and Information Theory | Data Structures, Cryptology and Information Theory | Computer Systems Organization and Communication NetworksDDC classification: 004.6 Online resources: Click here to access online
Contents:
Session 1 - Session Chair: Nikolaos Preve -- A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security -- Enhanced Access Polynomial Based Self-healing Key Distribution -- Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments -- Session 2 - Session Chair: Theofilos Chrysikos -- RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks -- Integrating Wireless Sensor Networks with Computational Grids -- Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos -- Signalprint-Based Intrusion Detection in Wireless Networks.
In: Springer eBooksSummary: This book constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September 2009. The workshop emphasizes on new ideas for secure architectures and protocols to enhance the emerging wireless systems. The 7 selected full papers cover topics on applied cryptography, key management, vulnerability analysis, privacy, authentication, and intrusion detection for emerging wireless systems.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Session 1 - Session Chair: Nikolaos Preve -- A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security -- Enhanced Access Polynomial Based Self-healing Key Distribution -- Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments -- Session 2 - Session Chair: Theofilos Chrysikos -- RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks -- Integrating Wireless Sensor Networks with Computational Grids -- Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos -- Signalprint-Based Intrusion Detection in Wireless Networks.

This book constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September 2009. The workshop emphasizes on new ideas for secure architectures and protocols to enhance the emerging wireless systems. The 7 selected full papers cover topics on applied cryptography, key management, vulnerability analysis, privacy, authentication, and intrusion detection for emerging wireless systems.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue