Verlag: VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2010
ISBN 10: 3838387279 ISBN 13: 9783838387277
Sprache: Englisch
Anbieter: Books Puddle, New York, NY, USA
EUR 66,07
Währung umrechnenAnzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 116.
Verlag: LAP LAMBERT Academic Publishing Aug 2010, 2010
ISBN 10: 3838387279 ISBN 13: 9783838387277
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 49,00
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -Routing is a fundamental networking function in every communication system, and multi-hop wireless networks are no exceptions. Attacking the routing service, an adversary can easily paralyse the operation of an entire network. The malicious manipulation of some routing messages results in the dissemination of incorrect routing information which can eventually lead to network malfunction. Even more, intermediate nodes can be corrupted, and thus, exhibit arbitrary behavior. Due to the subtle nature of attacks against routing protocols, informal reasoning about wireless routing security is an error-prone method. In this work, I develop a formal framework in which precise definitions of secure routing can be given, and secure routing protocols proposed for multi-hop wireless networks can be rigorously analysed. I demonstrate the usefulness of this framework in two ways: first, I prove the security of several existing routing protocols. Second, applying the design principles that were identified during the analyses, I propose novel routing protocols for wireless ad hoc and sensor networks and I prove that they are secure in my model.Books on Demand GmbH, Überseering 33, 22297 Hamburg 116 pp. Englisch.
Verlag: LAP LAMBERT Academic Publishing, 2010
ISBN 10: 3838387279 ISBN 13: 9783838387277
Sprache: Englisch
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
EUR 105,16
Währung umrechnenAnzahl: 1 verfügbar
In den Warenkorbpaperback. Zustand: Like New. Like New. book.
Verlag: LAP LAMBERT Academic Publishing Aug 2010, 2010
ISBN 10: 3838387279 ISBN 13: 9783838387277
Sprache: Englisch
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
EUR 49,00
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Routing is a fundamental networking function in every communication system, and multi-hop wireless networks are no exceptions. Attacking the routing service, an adversary can easily paralyse the operation of an entire network. The malicious manipulation of some routing messages results in the dissemination of incorrect routing information which can eventually lead to network malfunction. Even more, intermediate nodes can be corrupted, and thus, exhibit arbitrary behavior. Due to the subtle nature of attacks against routing protocols, informal reasoning about wireless routing security is an error-prone method. In this work, I develop a formal framework in which precise definitions of secure routing can be given, and secure routing protocols proposed for multi-hop wireless networks can be rigorously analysed. I demonstrate the usefulness of this framework in two ways: first, I prove the security of several existing routing protocols. Second, applying the design principles that were identified during the analyses, I propose novel routing protocols for wireless ad hoc and sensor networks and I prove that they are secure in my model. 116 pp. Englisch.
Verlag: VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2010
ISBN 10: 3838387279 ISBN 13: 9783838387277
Sprache: Englisch
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 67,10
Währung umrechnenAnzahl: 4 verfügbar
In den WarenkorbZustand: New. Print on Demand pp. 116 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam.
Verlag: VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2010
ISBN 10: 3838387279 ISBN 13: 9783838387277
Sprache: Englisch
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
EUR 70,14
Währung umrechnenAnzahl: 4 verfügbar
In den WarenkorbZustand: New. PRINT ON DEMAND pp. 116.
Verlag: LAP LAMBERT Academic Publishing, 2010
ISBN 10: 3838387279 ISBN 13: 9783838387277
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
EUR 41,05
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Acs GergelyGergely ACS received the M.Sc. and Ph.D. degree in Computer Science from the Budapest University of Technology and Economics (BME) in 2005 and 2009, resp. Currently, he is a post-doctoral researcher at INRIA Grenoble in .
Verlag: LAP LAMBERT Academic Publishing, 2010
ISBN 10: 3838387279 ISBN 13: 9783838387277
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 49,00
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Routing is a fundamental networking function in every communication system, and multi-hop wireless networks are no exceptions. Attacking the routing service, an adversary can easily paralyse the operation of an entire network. The malicious manipulation of some routing messages results in the dissemination of incorrect routing information which can eventually lead to network malfunction. Even more, intermediate nodes can be corrupted, and thus, exhibit arbitrary behavior. Due to the subtle nature of attacks against routing protocols, informal reasoning about wireless routing security is an error-prone method. In this work, I develop a formal framework in which precise definitions of secure routing can be given, and secure routing protocols proposed for multi-hop wireless networks can be rigorously analysed. I demonstrate the usefulness of this framework in two ways: first, I prove the security of several existing routing protocols. Second, applying the design principles that were identified during the analyses, I propose novel routing protocols for wireless ad hoc and sensor networks and I prove that they are secure in my model.