Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge [u.a.]
Cambridge Univ. Press
2008
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Contributor biographical information Publisher description kostenfrei Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | Literaturverz. S. 458 - 478 |
Beschreibung: | XVII, 485 S. graph. Darst. 26 cm |
ISBN: | 0521873711 9780521873710 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036493842 | ||
003 | DE-604 | ||
005 | 20121025 | ||
007 | t | ||
008 | 100609s2008 d||| |||| 00||| eng d | ||
010 | |a 2008295154 | ||
020 | |a 0521873711 |c (hbk.) : £40.00 |9 0-521-87371-1 | ||
020 | |a 9780521873710 |c (hbk.) : £40.00 |9 978-0-521-87371-0 | ||
035 | |a (OCoLC)255863904 | ||
035 | |a (DE-599)GBV54042238X | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-29T |a DE-898 | ||
082 | 0 | |a 005.8 | |
084 | |a DAT 254f |2 stub | ||
100 | 1 | |a Buttyán, Levente |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security and cooperation in wireless networks |b thwarting malicious and selfish behavior in the age of ubiquitous computing |c Levente Buttyán ; Jean-Pierre Hubaux |
250 | |a 1. publ. | ||
264 | 1 | |a Cambridge [u.a.] |b Cambridge Univ. Press |c 2008 | |
300 | |a XVII, 485 S. |b graph. Darst. |c 26 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturverz. S. 458 - 478 | ||
650 | 0 | |a Wireless communication systems / Security measures | |
650 | 0 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Funknetz |0 (DE-588)4216130-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 1 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Hubaux, Jean-Pierre |e Verfasser |4 aut | |
856 | 4 | |u http://www.gbv.de/dms/ilmenau/toc/54042238X.PDF |y Inhaltsverzeichnis |z kostenfrei | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0808/2008295154-b.html |y Contributor biographical information |z kostenfrei | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0808/2008295154-d.html |y Publisher description |z kostenfrei | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0808/2008295154-t.html |z kostenfrei |3 Inhaltsverzeichnis | |
856 | 4 | |m DE-601 |q pdf/application |u http://www.gbv.de/dms/bowker/toc/9780521873710.pdf |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020416410&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020416410 |
Datensatz im Suchindex
_version_ | 1804143056767680512 |
---|---|
adam_text | SECURITY AND COOPERATION IN WIRELESS NETWORKS THWARTING MALICIOUS AND
SELFISH BEHAVIOR IN THE AGE OF UBIQUITOUS COMPUTING LEVENTE BUTTYAN
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS (BME), HUNGARY
JEAN-PIERRE HUBAUX ECOLE POLYTECHNIQUE FEDERALE DE LAUSANNE (EPFL),
SWITZERLAND CAMBRIDGE UNIVERSITY PRESS CONTENTS PRESS ACE
ACKNOWLEDGEMENTS PARTI 1 THE 1.1 1.2 1.3 1.4 1.5 1.6 INTRODUCTION
SECURITY OF EXISTING WIRELESS NETWORKS VULNERABILITIES OF WIRELESS
NETWORKS SECURITY REQUIREMENTS HOW EXISTING WIRELESS NETWORKS ARE
SECURED SUMMARY TO PROBE FURTHER QUESTIONS 2 UPCOMING WIRELESS NETWORKS
AND NEW CHALLENGES 2.1 2.2 2.3 2.4 2.5 2.6 INTRODUCTION UPCOMING
WIRELESS NETWORKS TRENDS AND SECURITY CHALLENGES IN WIRELESS NETWORKS
SUMMARY TO PROBE FURTHER QUESTIONS 3 TRUST ASSUMPTIONS AND ADVERSARY
MODELS 3.1 3.2 3.3 3.4 3.5 3.6 PART II ABOUT TRUST TRUST IN THE ERA OF
UBIQUITOUS COMPUTING ADVERSARY SUMMARY TO PROBE FURTHER QUESTIONS
THWARTING MALICIOUS BEHAVIOR 4 NAMING AND ADDRESSING 4.1 4.2 THE FUTURE
OF NAMING AND ADDRESSING IN THE INTERNET ATTACKS AGAINST NAMING AND
ADDRESSING PAGE XI XVI 1 3 4 6 7 31 31 32 33 33 34 68 69 69 72 74 74 76
77 80 80 81 83 85 85 91 VLL VLLL CONTENTS 4.3 PROTECTION TECHNIQUES 94
4.4 SUMMARY 101 4.5 TO PROBE FURTHER 101 4.6 QUESTIONS 102 5
ESTABLISHMENT OF SECURITY ASSOCIATIONS 103 5.1 KEY ESTABLISHMENT IN
SENSOR NETWORKS 104 5.2 EXPLOITING PHYSICAL CONTACT 117 5.3 EXPLOITING
MOBILITY 118 5.4 EXPLOITING THE PROPERTIES OF VICINITY AND OF THE RADIO
LINK 128 5.5 REVOCATION 134 5.6 SUMMARY 136 5.7 TO PROBE FURTHER 137 5.8
QUESTIONS 140 6 SECURING NEIGHBOR DISCOVERY 141 6.1 THE WORMHOLE ATTACK
142 6.2 WORMHOLE DETECTION MECHANISMS 146 6.3 SUMMARY 167 6.4 TO PROBE
FURTHER 167 6.5 QUESTIONS 168 7 SECURE ROUTING IN MULTI-HOP WIRELESS
NETWORKS 169 7.1 ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS 169 7.2
ATTACKS ON AD HOC NETWORK ROUTING PROTOCOLS 182 7.3 SECURING AD HOC
NETWORK ROUTING PROTOCOLS 191 7.4 PROVABLE SECURITY FOR AD HOC NETWORK
ROUTING PROTOCOLS 217 7.5 SECURE ROUTING IN SENSOR NETWORKS 226 7.6
SUMMARY 234 7.7 TO PROBE FURTHER 235 7.8 QUESTIONS 236 8 PRIVACY
PROTECTION 237 8.1 IMPORTANT PRIVACY RELATED NOTIONS AND METRICS 240 8.2
PRIVACY IN RFID SYSTEMS 243 8.3 LOCATION PRIVACY IN VEHICULAR NETWORKS
254 8.4 PRIVACY PRESERVING ROUTING IN AD HOC NETWORKS 260 8.5 SUMMARY
267 8.6 TO PROBE FURTHER 268 8.7 QUESTIONS 270 PART III THWARTING
SELFISH BEHAVIOR 273 9 SELFISH BEHAVIOR AT THE MAC LAYER OF CSMA/CA 275
9.1 OPERATING PRINCIPLES OF IEEE 802.11 276 9.2 DETECTING SELFISH
BEHAVIOR IN HOTSPOTS 280 CONTENTS IX 9.3 9.4 9.5 9.6 SELFISH BEHAVIOR IN
PURE AD HOC NETWORKS SUMMARY TO PROBE FURTHER QUESTIONS 10 SELFISHNESS
IN PACKET FORWARDING 10.1 10.2 10.3 10.4 10.5 10.6 10.7 GAME THEORETIC
MODEL OF PACKET FORWARDING META-MODEL ANALYTICAL RESULTS SIMULATION
RESULTS SUMMARY TO PROBE FURTHER QUESTIONS 11 WIRELESS OPERATORS IN A
SHARED SPECTRUM 11.1 11.2 11.3 11.4 11.5 MULTI-DOMAIN SENSOR NETWORKS
BORDER GAMES IN CELLULAR OPERATORS SUMMARY TO PROBE FURTHER QUESTIONS 12
SECURE PROTOCOLS FOR BEHAVIOR ENFORCEMENT 12.1 12.2 12.3 12.4 12.5 12.6
12.7 12.8 SYSTEM MODEL COOPERATION-OPTIMAL PROTOCOL PROTOCOL FOR THE
ROUTING STAGE PROTOCOL FOR PACKET FORWARDING DISCUSSION SUMMARY TO PROBE
FURTHER QUESTIONS APPENDIX A INTRODUCTION TO CRYPTOGRAPHIC ALGORITHMS
AND PROTOCOLS AL A2 A3 A4 A5 A6 A7 A8 A9 A10 INTRODUCTION ENCRYPTION
HASH FUNCTIONS MESSAGE AUTHENTICATION CODES DIGITAL SIGNATURES SESSION
KEY ESTABLISHMENT PROTOCOLS PSEUDO-RANDOM NUMBER GENERATORS ADVANCED
AUTHENTICATION TECHNIQUES TO PROBE FURTHER QUESTIONS APPENDIX * A
TUTORIAL ON GAME THEORY FOR WIRELESS NETWORKS BL INTRODUCTION 301 327
328 329 331 332 335 338 343 347 348 348 350 350 361 376 376 377 379 379
381 383 387 389 390 390 391 393 393 394 407 409 411 412 417 418 422 422
423 423 CONTENTS B2 ** *4 *5 *6 *7 *8 STATIC GAMES DYNAMIC GAMES
REPEATED GAMES DISCUSSION SUMMARY TO PROBE FURTHER QUESTIONS REFERENCES
INDEX 427 437 444 451 454 454 455 458 479
|
any_adam_object | 1 |
author | Buttyán, Levente Hubaux, Jean-Pierre |
author_facet | Buttyán, Levente Hubaux, Jean-Pierre |
author_role | aut aut |
author_sort | Buttyán, Levente |
author_variant | l b lb j p h jph |
building | Verbundindex |
bvnumber | BV036493842 |
classification_tum | DAT 254f |
ctrlnum | (OCoLC)255863904 (DE-599)GBV54042238X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02498nam a2200541 c 4500</leader><controlfield tag="001">BV036493842</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121025 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100609s2008 d||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008295154</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0521873711</subfield><subfield code="c">(hbk.) : £40.00</subfield><subfield code="9">0-521-87371-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780521873710</subfield><subfield code="c">(hbk.) : £40.00</subfield><subfield code="9">978-0-521-87371-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255863904</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV54042238X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 254f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buttyán, Levente</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and cooperation in wireless networks</subfield><subfield code="b">thwarting malicious and selfish behavior in the age of ubiquitous computing</subfield><subfield code="c">Levente Buttyán ; Jean-Pierre Hubaux</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge [u.a.]</subfield><subfield code="b">Cambridge Univ. Press</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 485 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">26 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 458 - 478</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless communication systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hubaux, Jean-Pierre</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.gbv.de/dms/ilmenau/toc/54042238X.PDF</subfield><subfield code="y">Inhaltsverzeichnis</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0808/2008295154-b.html</subfield><subfield code="y">Contributor biographical information</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0808/2008295154-d.html</subfield><subfield code="y">Publisher description</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0808/2008295154-t.html</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/bowker/toc/9780521873710.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020416410&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020416410</subfield></datafield></record></collection> |
id | DE-604.BV036493842 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:41:36Z |
institution | BVB |
isbn | 0521873711 9780521873710 |
language | English |
lccn | 2008295154 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020416410 |
oclc_num | 255863904 |
open_access_boolean | 1 |
owner | DE-91 DE-BY-TUM DE-29T DE-898 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-29T DE-898 DE-BY-UBR |
physical | XVII, 485 S. graph. Darst. 26 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Cambridge Univ. Press |
record_format | marc |
spelling | Buttyán, Levente Verfasser aut Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyán ; Jean-Pierre Hubaux 1. publ. Cambridge [u.a.] Cambridge Univ. Press 2008 XVII, 485 S. graph. Darst. 26 cm txt rdacontent n rdamedia nc rdacarrier Literaturverz. S. 458 - 478 Wireless communication systems / Security measures Computer networks / Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Funknetz (DE-588)4216130-7 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Funknetz (DE-588)4216130-7 s Datensicherung (DE-588)4011144-1 s DE-604 Sicherheit (DE-588)4054790-5 s Hubaux, Jean-Pierre Verfasser aut http://www.gbv.de/dms/ilmenau/toc/54042238X.PDF Inhaltsverzeichnis kostenfrei http://www.loc.gov/catdir/enhancements/fy0808/2008295154-b.html Contributor biographical information kostenfrei http://www.loc.gov/catdir/enhancements/fy0808/2008295154-d.html Publisher description kostenfrei http://www.loc.gov/catdir/enhancements/fy0808/2008295154-t.html kostenfrei Inhaltsverzeichnis DE-601 pdf/application http://www.gbv.de/dms/bowker/toc/9780521873710.pdf Inhaltsverzeichnis GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020416410&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Buttyán, Levente Hubaux, Jean-Pierre Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Wireless communication systems / Security measures Computer networks / Security measures Datensicherung (DE-588)4011144-1 gnd Funknetz (DE-588)4216130-7 gnd Sicherheit (DE-588)4054790-5 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4216130-7 (DE-588)4054790-5 |
title | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_auth | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_exact_search | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_full | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyán ; Jean-Pierre Hubaux |
title_fullStr | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyán ; Jean-Pierre Hubaux |
title_full_unstemmed | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyán ; Jean-Pierre Hubaux |
title_short | Security and cooperation in wireless networks |
title_sort | security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_sub | thwarting malicious and selfish behavior in the age of ubiquitous computing |
topic | Wireless communication systems / Security measures Computer networks / Security measures Datensicherung (DE-588)4011144-1 gnd Funknetz (DE-588)4216130-7 gnd Sicherheit (DE-588)4054790-5 gnd |
topic_facet | Wireless communication systems / Security measures Computer networks / Security measures Datensicherung Funknetz Sicherheit |
url | http://www.gbv.de/dms/ilmenau/toc/54042238X.PDF http://www.loc.gov/catdir/enhancements/fy0808/2008295154-b.html http://www.loc.gov/catdir/enhancements/fy0808/2008295154-d.html http://www.loc.gov/catdir/enhancements/fy0808/2008295154-t.html http://www.gbv.de/dms/bowker/toc/9780521873710.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020416410&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT buttyanlevente securityandcooperationinwirelessnetworksthwartingmaliciousandselfishbehaviorintheageofubiquitouscomputing AT hubauxjeanpierre securityandcooperationinwirelessnetworksthwartingmaliciousandselfishbehaviorintheageofubiquitouscomputing |
Es ist kein Print-Exemplar vorhanden.
Volltext öffnen