0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21,... Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers (Paperback, 2006 ed.)
Levente Buttyan, Virgil Gligor, Dirk Westhoff
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2006, held in Hamburg, Germany in September 2006 in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). The papers present original research on all aspects of security and privacy in wireless ad hoc and sensor networks.

Security and Cooperation in Wireless Networks - Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing... Security and Cooperation in Wireless Networks - Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing (Hardcover)
Levente Buttyan, Jean-Pierre Hubaux
R2,135 Discovery Miles 21 350 Ships in 10 - 15 working days

This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710).

Cryptographic Obfuscation - A Survey (Paperback, 1st ed. 2020): Mate Horvath, Levente Buttyan Cryptographic Obfuscation - A Survey (Paperback, 1st ed. 2020)
Mate Horvath, Levente Buttyan
R1,634 Discovery Miles 16 340 Ships in 18 - 22 working days

This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Performativity and Event in 1960s Japan…
P. Eckersall Hardcover R2,279 R1,783 Discovery Miles 17 830
Light Through The Bars - Understanding…
Babychan Arackathara Paperback R30 R28 Discovery Miles 280
Staging and Stage Decor: Early Modern…
Barbara Mujica Hardcover R2,239 Discovery Miles 22 390
Emotional Success - The Power of…
David Desteno Paperback  (1)
R492 R393 Discovery Miles 3 930
Systems Thinkers
Magnus Ramage, Karen Shipp Paperback R1,966 R1,858 Discovery Miles 18 580
Managing A Network Vulnerability…
Thomas R. Peltier, Justin Peltier, … Paperback R2,607 Discovery Miles 26 070
Introduction to Computer Networking
Thomas G. Robertazzi Hardcover R3,909 Discovery Miles 39 090
Cases on E-Readiness and Information…
Mustafa Alshawi, Mohammed Arif Hardcover R4,642 Discovery Miles 46 420
Talking To Strangers - What We Should…
Malcolm Gladwell Paperback  (2)
R275 R254 Discovery Miles 2 540
Beginning Xcode - Swift 3 Edition
Matthew Knott Paperback R2,650 R2,479 Discovery Miles 24 790

 

Partners