Mobile and wireless networks security :: proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 /
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobil...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore :
World Scientific,
©2008.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore |
Beschreibung: | 1 online resource (x, 77 pages) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9812833269 9789812833266 1281968315 9781281968319 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn316005735 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 080911s2008 njua ob 100 0 eng d | ||
010 | |z 2008501287 | ||
040 | |a CDX |b eng |e pn |c CDX |d OCLCQ |d IDEBK |d OCLCQ |d M6U |d N$T |d I9W |d E7B |d OCLCF |d YDXCP |d OCLCO |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d OCL |d OCLCO |d OCLCQ |d AGLDB |d OCLCQ |d VTS |d STF |d AU@ |d M8D |d UKAHL |d OCL |d LEAUB |d OCL |d OCLCO |d OCLCQ |d OCLCO |d INARC |d OCLCL | ||
019 | |a 696628385 |a 815757589 |a 1086447546 |a 1412659767 | ||
020 | |a 9812833269 |q (electronic bk.) | ||
020 | |a 9789812833266 |q (electronic bk.) | ||
020 | |a 1281968315 | ||
020 | |a 9781281968319 | ||
020 | |z 9789812833259 | ||
020 | |z 9812833250 (pbk.) | ||
035 | |a (OCoLC)316005735 |z (OCoLC)696628385 |z (OCoLC)815757589 |z (OCoLC)1086447546 |z (OCoLC)1412659767 | ||
050 | 4 | |a TK5103.2 |b .M63 2008eb | |
072 | 7 | |a COM |x 031000 |2 bisacsh | |
072 | 7 | |a TEC |x 067000 |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 7 | |a 621.382 22 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Mobile and wireless networks security : |b proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 / |c editors Maryline Laurent-Maknavicius, Hakima Chaouchi. |
260 | |a Singapore : |b World Scientific, |c ©2008. | ||
300 | |a 1 online resource (x, 77 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references. | ||
588 | 0 | |a Print version record. | |
520 | |a Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore | ||
505 | 0 | |a Toward a new ad hoc node design for secure service deployment over ad hoc network / Hakima Chaouchi and Marykine Laurent-Maknavicius -- TCA: topology change attack in peer-to-peer networks / Mahdi Abdelouahab [and others] -- Device pairing using unidirectional physical channels / Nitesh Saxena and Md. Borhan Uddin -- An industrial and academic joint experiment on automated verification of a security protocol / Olivier Heen [and others] -- A performance-based approach to selecting a secure service discovery architecture / Slim Trabelsi [and others] -- A solution for defending against denial of service attack on wireless LAN / Dinh-Thuc Nguyen, Ngoc-Bao Tran and Minh-Duc Nguyen-Ho. | |
650 | 0 | |a Wireless communication systems |x Security measures |v Congresses. | |
650 | 6 | |a Transmission sans fil |x Sécurité |x Mesures |v Congrès. | |
650 | 7 | |a COMPUTERS |x Information Theory. |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Signals & Signal Processing. |2 bisacsh | |
650 | 7 | |a Wireless communication systems |x Security measures |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Laurent-Maknavicius, Maryline. | |
700 | 1 | |a Chaouchi, Hakima. | |
758 | |i has work: |a Mobile and wireless networks security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGvRWHQyxwRvfGX9Xm8XBP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=521186 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH24686058 | ||
938 | |a Coutts Information Services |b COUT |n 9672985 | ||
938 | |a EBSCOhost |b EBSC |n 521186 | ||
938 | |a YBP Library Services |b YANK |n 9975226 | ||
938 | |a Internet Archive |b INAR |n mobilewirelessne0000mobi | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn316005735 |
---|---|
_version_ | 1816881689448677376 |
adam_text | |
any_adam_object | |
author2 | Laurent-Maknavicius, Maryline Chaouchi, Hakima |
author2_role | |
author2_variant | m l m mlm h c hc |
author_facet | Laurent-Maknavicius, Maryline Chaouchi, Hakima |
author_sort | Laurent-Maknavicius, Maryline |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.2 .M63 2008eb |
callnumber-search | TK5103.2 .M63 2008eb |
callnumber-sort | TK 45103.2 M63 42008EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Toward a new ad hoc node design for secure service deployment over ad hoc network / Hakima Chaouchi and Marykine Laurent-Maknavicius -- TCA: topology change attack in peer-to-peer networks / Mahdi Abdelouahab [and others] -- Device pairing using unidirectional physical channels / Nitesh Saxena and Md. Borhan Uddin -- An industrial and academic joint experiment on automated verification of a security protocol / Olivier Heen [and others] -- A performance-based approach to selecting a secure service discovery architecture / Slim Trabelsi [and others] -- A solution for defending against denial of service attack on wireless LAN / Dinh-Thuc Nguyen, Ngoc-Bao Tran and Minh-Duc Nguyen-Ho. |
ctrlnum | (OCoLC)316005735 |
dewey-full | 621.38222 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 22 |
dewey-search | 621.382 22 |
dewey-sort | 3621.382 222 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04340cam a2200613 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn316005735</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">080911s2008 njua ob 100 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2008501287</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CDX</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">CDX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M6U</subfield><subfield code="d">N$T</subfield><subfield code="d">I9W</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">STF</subfield><subfield code="d">AU@</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCL</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">696628385</subfield><subfield code="a">815757589</subfield><subfield code="a">1086447546</subfield><subfield code="a">1412659767</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812833269</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812833266</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281968315</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281968319</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789812833259</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9812833250 (pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)316005735</subfield><subfield code="z">(OCoLC)696628385</subfield><subfield code="z">(OCoLC)815757589</subfield><subfield code="z">(OCoLC)1086447546</subfield><subfield code="z">(OCoLC)1412659767</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5103.2</subfield><subfield code="b">.M63 2008eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">031000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">621.382 22</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Mobile and wireless networks security :</subfield><subfield code="b">proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 /</subfield><subfield code="c">editors Maryline Laurent-Maknavicius, Hakima Chaouchi.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Singapore :</subfield><subfield code="b">World Scientific,</subfield><subfield code="c">©2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 77 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Toward a new ad hoc node design for secure service deployment over ad hoc network / Hakima Chaouchi and Marykine Laurent-Maknavicius -- TCA: topology change attack in peer-to-peer networks / Mahdi Abdelouahab [and others] -- Device pairing using unidirectional physical channels / Nitesh Saxena and Md. Borhan Uddin -- An industrial and academic joint experiment on automated verification of a security protocol / Olivier Heen [and others] -- A performance-based approach to selecting a secure service discovery architecture / Slim Trabelsi [and others] -- A solution for defending against denial of service attack on wireless LAN / Dinh-Thuc Nguyen, Ngoc-Bao Tran and Minh-Duc Nguyen-Ho.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Transmission sans fil</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Signals & Signal Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Laurent-Maknavicius, Maryline.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaouchi, Hakima.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Mobile and wireless networks security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGvRWHQyxwRvfGX9Xm8XBP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=521186</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH24686058</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">9672985</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">521186</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">9975226</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">mobilewirelessne0000mobi</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn316005735 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:42Z |
institution | BVB |
isbn | 9812833269 9789812833266 1281968315 9781281968319 |
language | English |
oclc_num | 316005735 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (x, 77 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | World Scientific, |
record_format | marc |
spelling | Mobile and wireless networks security : proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi. Singapore : World Scientific, ©2008. 1 online resource (x, 77 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references. Print version record. Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore Toward a new ad hoc node design for secure service deployment over ad hoc network / Hakima Chaouchi and Marykine Laurent-Maknavicius -- TCA: topology change attack in peer-to-peer networks / Mahdi Abdelouahab [and others] -- Device pairing using unidirectional physical channels / Nitesh Saxena and Md. Borhan Uddin -- An industrial and academic joint experiment on automated verification of a security protocol / Olivier Heen [and others] -- A performance-based approach to selecting a secure service discovery architecture / Slim Trabelsi [and others] -- A solution for defending against denial of service attack on wireless LAN / Dinh-Thuc Nguyen, Ngoc-Bao Tran and Minh-Duc Nguyen-Ho. Wireless communication systems Security measures Congresses. Transmission sans fil Sécurité Mesures Congrès. COMPUTERS Information Theory. bisacsh TECHNOLOGY & ENGINEERING Signals & Signal Processing. bisacsh Wireless communication systems Security measures fast Conference papers and proceedings fast Laurent-Maknavicius, Maryline. Chaouchi, Hakima. has work: Mobile and wireless networks security (Text) https://id.oclc.org/worldcat/entity/E39PCGvRWHQyxwRvfGX9Xm8XBP https://id.oclc.org/worldcat/ontology/hasWork FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=521186 Volltext |
spellingShingle | Mobile and wireless networks security : proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 / Toward a new ad hoc node design for secure service deployment over ad hoc network / Hakima Chaouchi and Marykine Laurent-Maknavicius -- TCA: topology change attack in peer-to-peer networks / Mahdi Abdelouahab [and others] -- Device pairing using unidirectional physical channels / Nitesh Saxena and Md. Borhan Uddin -- An industrial and academic joint experiment on automated verification of a security protocol / Olivier Heen [and others] -- A performance-based approach to selecting a secure service discovery architecture / Slim Trabelsi [and others] -- A solution for defending against denial of service attack on wireless LAN / Dinh-Thuc Nguyen, Ngoc-Bao Tran and Minh-Duc Nguyen-Ho. Wireless communication systems Security measures Congresses. Transmission sans fil Sécurité Mesures Congrès. COMPUTERS Information Theory. bisacsh TECHNOLOGY & ENGINEERING Signals & Signal Processing. bisacsh Wireless communication systems Security measures fast |
title | Mobile and wireless networks security : proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 / |
title_auth | Mobile and wireless networks security : proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 / |
title_exact_search | Mobile and wireless networks security : proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 / |
title_full | Mobile and wireless networks security : proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi. |
title_fullStr | Mobile and wireless networks security : proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi. |
title_full_unstemmed | Mobile and wireless networks security : proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 / editors Maryline Laurent-Maknavicius, Hakima Chaouchi. |
title_short | Mobile and wireless networks security : |
title_sort | mobile and wireless networks security proceedings of the mwns 2008 workshop singapore 9 april 2008 |
title_sub | proceedings of the MWNS 2008 workshop : Singapore 9 April 2008 / |
topic | Wireless communication systems Security measures Congresses. Transmission sans fil Sécurité Mesures Congrès. COMPUTERS Information Theory. bisacsh TECHNOLOGY & ENGINEERING Signals & Signal Processing. bisacsh Wireless communication systems Security measures fast |
topic_facet | Wireless communication systems Security measures Congresses. Transmission sans fil Sécurité Mesures Congrès. COMPUTERS Information Theory. TECHNOLOGY & ENGINEERING Signals & Signal Processing. Wireless communication systems Security measures Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=521186 |
work_keys_str_mv | AT laurentmaknaviciusmaryline mobileandwirelessnetworkssecurityproceedingsofthemwns2008workshopsingapore9april2008 AT chaouchihakima mobileandwirelessnetworkssecurityproceedingsofthemwns2008workshopsingapore9april2008 |