Matches in Library of Congress for { <http://lccn.loc.gov/2010280297> ?p ?o. }
Showing items 1 to 26 of
26
with 100 items per page.
- 2010280297 contributor B11807090.
- 2010280297 created "c2007.".
- 2010280297 date "2007".
- 2010280297 date "c2007.".
- 2010280297 dateCopyrighted "c2007.".
- 2010280297 description "Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti -- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo -- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler -- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing -- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo -- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni -- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang -- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic -- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland -- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar -- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok -- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris -- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong -- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen -- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang -- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu -- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C. M. Leung -- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu.".
- 2010280297 description "Includes bibliographical references.".
- 2010280297 extent "xvi, 493 p. :".
- 2010280297 identifier "9789812708076".
- 2010280297 identifier "9812708073".
- 2010280297 isPartOf "Computer and network security ; v. 1".
- 2010280297 issued "2007".
- 2010280297 issued "c2007.".
- 2010280297 language "eng".
- 2010280297 publisher "Singapore ; Hackensack, NJ : World Scientific,".
- 2010280297 subject "005.44 22".
- 2010280297 subject "Computer networks Security measures.".
- 2010280297 subject "Distributed operating systems (Computers) Security measures.".
- 2010280297 subject "Electronic data processing Distributed processing.".
- 2010280297 subject "QA76.9.A25 S4345 2007".
- 2010280297 subject "Réseaux d'ordinateurs Sécurité Mesures.".
- 2010280297 subject "Systèmes d'exploitation répartis Sécurité Mesures.".
- 2010280297 subject "Traitement réparti.".
- 2010280297 tableOfContents "Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti -- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo -- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler -- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing -- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo -- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni -- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang -- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic -- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland -- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar -- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok -- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris -- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong -- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen -- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang -- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu -- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C. M. Leung -- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu.".
- 2010280297 title "Security in distributed and networking systems / editors, Yang Xiao, Yi Pan.".
- 2010280297 type "text".