The book I order was 'new', wrapped in plastic cover. It was delivered in less than one week with UPS and in great condition. I am very pleased with it.
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
โ Scribed by Raheem Beyah, Janise Mcnair, Cherita Corbett
- Publisher
- World Scientific Publishing Company
- Year
- 2009
- Tongue
- English
- Leaves
- 403
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Security issues in ad-hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas.
๐ SIMILAR VOLUMES
<P>In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As
<p><STRONG><P>Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks</STRONG> presents the latest research results in the area of secure localization and time synchronization for both wireless mobile ad hoc networks and wireless sensor networks. Recent advances in compu
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As alw