It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_updates/v39.i27.records.utf8:6068255:3324
Source Library of Congress
Download Link /show-records/marc_loc_updates/v39.i27.records.utf8:6068255:3324?format=raw

LEADER: 03324nam a22003377a 4500
001 2010280297
003 DLC
005 20110630125046.0
008 100617s2007 xx ac b 000 0 eng d
010 $a 2010280297
020 $a9789812708076
020 $a9812708073
035 $a(OCoLC)ocn166373560
040 $aBTCTA$cBTCTA$dYDXCP$dBAKER$dUUM$dOCLCG$dSINLB$dMUQ$dW2U$dDLC
042 $alccopycat
050 00 $aQA76.9.A25$bS4345 2007
082 04 $a005.44$222
245 00 $aSecurity in distributed and networking systems /$ceditors, Yang Xiao, Yi Pan.
260 $aSingapore ;$aHackensack, NJ :$bWorld Scientific,$cc2007.
300 $axvi, 493 p. :$bill., col. ports. ;$c24 cm.
440 0 $aComputer and network security ;$vv. 1
504 $aIncludes bibliographical references.
505 0 $aCh. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti -- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo -- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler -- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing -- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo -- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni -- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang -- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic -- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland -- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar -- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok -- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris -- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong -- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen -- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang -- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu -- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C. M. Leung -- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu.
650 0 $aComputer networks$xSecurity measures.
650 0 $aDistributed operating systems (Computers)$xSecurity measures.
650 0 $aElectronic data processing$xDistributed processing.
650 6 $aRéseaux d'ordinateurs$xSécurité$xMesures.
650 6 $aSystèmes d'exploitation répartis$xSécurité$xMesures.
650 6 $aTraitement réparti.
700 1 $aXiao, Yang,$d1966-
700 1 $aPan, Yi,$d1960-