0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21,... Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers (Paperback, 2006 ed.)
Levente Buttyan, Virgil Gligor, Dirk Westhoff
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2006, held in Hamburg, Germany in September 2006 in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). The papers present original research on all aspects of security and privacy in wireless ad hoc and sensor networks.

Security and Cooperation in Wireless Networks - Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing... Security and Cooperation in Wireless Networks - Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing (Hardcover)
Levente Buttyan, Jean-Pierre Hubaux
R2,072 Discovery Miles 20 720 Ships in 12 - 17 working days

This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710).

Cryptographic Obfuscation - A Survey (Paperback, 1st ed. 2020): Mate Horvath, Levente Buttyan Cryptographic Obfuscation - A Survey (Paperback, 1st ed. 2020)
Mate Horvath, Levente Buttyan
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Microsoft Xbox Series X Console (1TB)
 (21)
R14,999 Discovery Miles 149 990
The Walking Dead - Season 1 / 2 / 3 / 4
Andrew Lincoln Blu-ray disc  (1)
R277 Discovery Miles 2 770
Alva 5-Piece Roll-Up BBQ/ Braai Tool Set
R550 Discovery Miles 5 500
Konix Naruto Gamepad for Nintendo Switch…
R699 R599 Discovery Miles 5 990
Sony PULSE Explore Wireless Earbuds
R4,999 R4,749 Discovery Miles 47 490
Bosch GBM 320 Professional Drill…
R779 R728 Discovery Miles 7 280
Rogz Indoor 3D Pod Dog Bed (Petrol/Grey…
R1,740 Discovery Miles 17 400
Pineware Steam, Spray, Dry Iron (1400W)
R247 Discovery Miles 2 470
Nexus Plugtop Solid 3Pin (16A) (White )
R49 R25 Discovery Miles 250
100 Most Successful Women Around The…
Maria-Renee Davila, Caroline Makaka Paperback R550 R463 Discovery Miles 4 630

 

Partners