Mobile and wireless networks security: proceedings of the MWNS 2008 workshop : Singapore 9 April 2008
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Singapore
World Scientific
c2008
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore Toward a new ad hoc node design for secure service deployment over ad hoc network / Hakima Chaouchi and Marykine Laurent-Maknavicius -- TCA: topology change attack in peer-to-peer networks / Mahdi Abdelouahab ... [et al.] -- Device pairing using unidirectional physical channels / Nitesh Saxena and Md. Borhan Uddin -- An industrial and academic joint experiment on automated verification of a security protocol / Olivier Heen ... [et al.] -- A performance-based approach to selecting a secure service discovery architecture / Slim Trabelsi ... [et al.] -- A solution for defending against denial of service attack on wireless LAN / Dinh-Thuc Nguyen, Ngoc-Bao Tran and Minh-Duc Nguyen-Ho |
Beschreibung: | 1 Online-Ressource (x, 77 p.) |
ISBN: | 1281968315 9781281968319 9789812833259 9789812833266 9812833269 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043080211 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2008 |||| o||u| ||||||eng d | ||
020 | |a 1281968315 |9 1-281-96831-5 | ||
020 | |a 9781281968319 |9 978-1-281-96831-9 | ||
020 | |a 9789812833259 |9 978-981-283-325-9 | ||
020 | |a 9789812833266 |c electronic bk. |9 978-981-283-326-6 | ||
020 | |a 9812833269 |c electronic bk. |9 981-283-326-9 | ||
035 | |a (OCoLC)316005735 | ||
035 | |a (DE-599)BVBBV043080211 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 621.382 22 |2 22 | |
245 | 1 | 0 | |a Mobile and wireless networks security |b proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 |c editors Maryline Laurent-Maknavicius, Hakima Chaouchi |
264 | 1 | |a Singapore |b World Scientific |c c2008 | |
300 | |a 1 Online-Ressource (x, 77 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
500 | |a Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore | ||
500 | |a Toward a new ad hoc node design for secure service deployment over ad hoc network / Hakima Chaouchi and Marykine Laurent-Maknavicius -- TCA: topology change attack in peer-to-peer networks / Mahdi Abdelouahab ... [et al.] -- Device pairing using unidirectional physical channels / Nitesh Saxena and Md. Borhan Uddin -- An industrial and academic joint experiment on automated verification of a security protocol / Olivier Heen ... [et al.] -- A performance-based approach to selecting a secure service discovery architecture / Slim Trabelsi ... [et al.] -- A solution for defending against denial of service attack on wireless LAN / Dinh-Thuc Nguyen, Ngoc-Bao Tran and Minh-Duc Nguyen-Ho | ||
650 | 7 | |a COMPUTERS / Information Theory |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Signals & Signal Processing |2 bisacsh | |
650 | 7 | |a Wireless communication systems / Security measures |2 fast | |
650 | 4 | |a Wireless communication systems |x Security measures |v Congresses | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Laurent-Maknavicius, Maryline |e Sonstige |4 oth | |
700 | 1 | |a Chaouchi, Hakima |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521186 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028504403 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521186 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521186 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175471696412672 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043080211 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)316005735 (DE-599)BVBBV043080211 |
dewey-full | 621.38222 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 22 |
dewey-search | 621.382 22 |
dewey-sort | 3621.382 222 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03695nmm a2200469zc 4500</leader><controlfield tag="001">BV043080211</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281968315</subfield><subfield code="9">1-281-96831-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281968319</subfield><subfield code="9">978-1-281-96831-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812833259</subfield><subfield code="9">978-981-283-325-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812833266</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-981-283-326-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812833269</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">981-283-326-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)316005735</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043080211</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382 22</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile and wireless networks security</subfield><subfield code="b">proceedings of the MWNS 2008 workshop : Singapore 9 April 2008</subfield><subfield code="c">editors Maryline Laurent-Maknavicius, Hakima Chaouchi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">World Scientific</subfield><subfield code="c">c2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 77 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Toward a new ad hoc node design for secure service deployment over ad hoc network / Hakima Chaouchi and Marykine Laurent-Maknavicius -- TCA: topology change attack in peer-to-peer networks / Mahdi Abdelouahab ... [et al.] -- Device pairing using unidirectional physical channels / Nitesh Saxena and Md. Borhan Uddin -- An industrial and academic joint experiment on automated verification of a security protocol / Olivier Heen ... [et al.] -- A performance-based approach to selecting a secure service discovery architecture / Slim Trabelsi ... [et al.] -- A solution for defending against denial of service attack on wireless LAN / Dinh-Thuc Nguyen, Ngoc-Bao Tran and Minh-Duc Nguyen-Ho</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Signals & Signal Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Laurent-Maknavicius, Maryline</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaouchi, Hakima</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521186</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028504403</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521186</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521186</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043080211 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:49Z |
institution | BVB |
isbn | 1281968315 9781281968319 9789812833259 9789812833266 9812833269 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028504403 |
oclc_num | 316005735 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (x, 77 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | World Scientific |
record_format | marc |
spelling | Mobile and wireless networks security proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 editors Maryline Laurent-Maknavicius, Hakima Chaouchi Singapore World Scientific c2008 1 Online-Ressource (x, 77 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore Toward a new ad hoc node design for secure service deployment over ad hoc network / Hakima Chaouchi and Marykine Laurent-Maknavicius -- TCA: topology change attack in peer-to-peer networks / Mahdi Abdelouahab ... [et al.] -- Device pairing using unidirectional physical channels / Nitesh Saxena and Md. Borhan Uddin -- An industrial and academic joint experiment on automated verification of a security protocol / Olivier Heen ... [et al.] -- A performance-based approach to selecting a secure service discovery architecture / Slim Trabelsi ... [et al.] -- A solution for defending against denial of service attack on wireless LAN / Dinh-Thuc Nguyen, Ngoc-Bao Tran and Minh-Duc Nguyen-Ho COMPUTERS / Information Theory bisacsh TECHNOLOGY & ENGINEERING / Signals & Signal Processing bisacsh Wireless communication systems / Security measures fast Wireless communication systems Security measures Congresses (DE-588)1071861417 Konferenzschrift gnd-content Laurent-Maknavicius, Maryline Sonstige oth Chaouchi, Hakima Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521186 Aggregator Volltext |
spellingShingle | Mobile and wireless networks security proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 COMPUTERS / Information Theory bisacsh TECHNOLOGY & ENGINEERING / Signals & Signal Processing bisacsh Wireless communication systems / Security measures fast Wireless communication systems Security measures Congresses |
subject_GND | (DE-588)1071861417 |
title | Mobile and wireless networks security proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 |
title_auth | Mobile and wireless networks security proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 |
title_exact_search | Mobile and wireless networks security proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 |
title_full | Mobile and wireless networks security proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 editors Maryline Laurent-Maknavicius, Hakima Chaouchi |
title_fullStr | Mobile and wireless networks security proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 editors Maryline Laurent-Maknavicius, Hakima Chaouchi |
title_full_unstemmed | Mobile and wireless networks security proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 editors Maryline Laurent-Maknavicius, Hakima Chaouchi |
title_short | Mobile and wireless networks security |
title_sort | mobile and wireless networks security proceedings of the mwns 2008 workshop singapore 9 april 2008 |
title_sub | proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 |
topic | COMPUTERS / Information Theory bisacsh TECHNOLOGY & ENGINEERING / Signals & Signal Processing bisacsh Wireless communication systems / Security measures fast Wireless communication systems Security measures Congresses |
topic_facet | COMPUTERS / Information Theory TECHNOLOGY & ENGINEERING / Signals & Signal Processing Wireless communication systems / Security measures Wireless communication systems Security measures Congresses Konferenzschrift |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521186 |
work_keys_str_mv | AT laurentmaknaviciusmaryline mobileandwirelessnetworkssecurityproceedingsofthemwns2008workshopsingapore9april2008 AT chaouchihakima mobileandwirelessnetworkssecurityproceedingsofthemwns2008workshopsingapore9april2008 |