Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing
This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Cambridge
Cambridge University Press
2008
|
Links: | https://doi.org/10.1017/CBO9780511815102 |
Zusammenfassung: | This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710). |
Umfang: | 1 Online-Ressource (xvii, 485 Seiten) |
ISBN: | 9780511815102 |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-20-CTM-CR9780511815102 | ||
003 | UkCbUP | ||
005 | 20151005020622.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr|||||||||||| | ||
008 | 101021s2008||||enk o ||1 0|eng|d | ||
020 | |a 9780511815102 | ||
100 | 1 | |a Buttyán, Levente | |
245 | 1 | 0 | |a Security and cooperation in wireless networks |b thwarting malicious and selfish behavior in the age of ubiquitous computing |c Levente Buttyan, Jean-Pierre Hubaux |
246 | 3 | |a Security & Cooperation in Wireless Networks | |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2008 | |
300 | |a 1 Online-Ressource (xvii, 485 Seiten) | ||
336 | |b txt | ||
337 | |b c | ||
338 | |b cr | ||
520 | |a This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710). | ||
700 | 1 | |a Hubaux, Jean-Pierre | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780521873710 |
966 | 4 | 0 | |l DE-91 |p ZDB-20-CTM |q TUM_PDA_CTM |u https://doi.org/10.1017/CBO9780511815102 |3 Volltext |
912 | |a ZDB-20-CTM | ||
912 | |a ZDB-20-CTM | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-20-CTM-CR9780511815102 |
---|---|
_version_ | 1825574051159998466 |
adam_text | |
any_adam_object | |
author | Buttyán, Levente |
author2 | Hubaux, Jean-Pierre |
author2_role | |
author2_variant | j p h jph |
author_facet | Buttyán, Levente Hubaux, Jean-Pierre |
author_role | |
author_sort | Buttyán, Levente |
author_variant | l b lb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-20-CTM |
format | eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02021nam a2200265 i 4500</leader><controlfield tag="001">ZDB-20-CTM-CR9780511815102</controlfield><controlfield tag="003">UkCbUP</controlfield><controlfield tag="005">20151005020622.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr||||||||||||</controlfield><controlfield tag="008">101021s2008||||enk o ||1 0|eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511815102</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buttyán, Levente</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and cooperation in wireless networks</subfield><subfield code="b">thwarting malicious and selfish behavior in the age of ubiquitous computing</subfield><subfield code="c">Levente Buttyan, Jean-Pierre Hubaux</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Security & Cooperation in Wireless Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 485 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710).</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hubaux, Jean-Pierre</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780521873710</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-20-CTM</subfield><subfield code="q">TUM_PDA_CTM</subfield><subfield code="u">https://doi.org/10.1017/CBO9780511815102</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CTM</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CTM</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-20-CTM-CR9780511815102 |
illustrated | Not Illustrated |
indexdate | 2025-03-03T11:58:05Z |
institution | BVB |
isbn | 9780511815102 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvii, 485 Seiten) |
psigel | ZDB-20-CTM TUM_PDA_CTM ZDB-20-CTM |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Buttyán, Levente Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyan, Jean-Pierre Hubaux Security & Cooperation in Wireless Networks Cambridge Cambridge University Press 2008 1 Online-Ressource (xvii, 485 Seiten) txt c cr This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710). Hubaux, Jean-Pierre Erscheint auch als Druck-Ausgabe 9780521873710 |
spellingShingle | Buttyán, Levente Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_alt | Security & Cooperation in Wireless Networks |
title_auth | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_exact_search | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_full | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyan, Jean-Pierre Hubaux |
title_fullStr | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyan, Jean-Pierre Hubaux |
title_full_unstemmed | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyan, Jean-Pierre Hubaux |
title_short | Security and cooperation in wireless networks |
title_sort | security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_sub | thwarting malicious and selfish behavior in the age of ubiquitous computing |
work_keys_str_mv | AT buttyanlevente securityandcooperationinwirelessnetworksthwartingmaliciousandselfishbehaviorintheageofubiquitouscomputing AT hubauxjeanpierre securityandcooperationinwirelessnetworksthwartingmaliciousandselfishbehaviorintheageofubiquitouscomputing AT buttyanlevente securitycooperationinwirelessnetworks AT hubauxjeanpierre securitycooperationinwirelessnetworks |