0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21,... Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers (Paperback, 2006 ed.)
Levente Buttyan, Virgil Gligor, Dirk Westhoff
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2006, held in Hamburg, Germany in September 2006 in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). The papers present original research on all aspects of security and privacy in wireless ad hoc and sensor networks.

Security and Cooperation in Wireless Networks - Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing... Security and Cooperation in Wireless Networks - Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing (Hardcover)
Levente Buttyan, Jean-Pierre Hubaux
R2,024 Discovery Miles 20 240 Ships in 12 - 17 working days

This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710).

Cryptographic Obfuscation - A Survey (Paperback, 1st ed. 2020): Mate Horvath, Levente Buttyan Cryptographic Obfuscation - A Survey (Paperback, 1st ed. 2020)
Mate Horvath, Levente Buttyan
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
RLE: Japan Mini-Set D: Politics (POD) (8…
Various Hardcover R22,145 Discovery Miles 221 450
Money-Maker - Or, the Victory of the…
Oliver Optic Paperback R540 Discovery Miles 5 400
The Land Is Ours - Black Lawyers And The…
Tembeka Ngcukaitobi Paperback  (11)
R380 R297 Discovery Miles 2 970
Africa's Business Revolution - How to…
Acha Leke, Mutsa Chironga, … Hardcover  (1)
R736 R618 Discovery Miles 6 180
Women In Solitary - Inside The Female…
Shanthini Naidoo Paperback  (1)
R355 R305 Discovery Miles 3 050
Heart Of A Strong Woman - From Daveyton…
Xoliswa Nduneni-Ngema, Fred Khumalo Paperback R350 R301 Discovery Miles 3 010
New Daughters Of Africa - An…
Margaret Busby Paperback R360 Discovery Miles 3 600
Tell Me Your Story - South Africans…
Ruda Landman Paperback  (3)
R390 R335 Discovery Miles 3 350
How Did We Get Here? - A Girl's Guide to…
Mpoomy Ledwaba Paperback  (1)
R290 R195 Discovery Miles 1 950
Picturing Greensboro - Four Decades of…
Otis L. Hairston Paperback R500 R421 Discovery Miles 4 210

 

Partners