0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (6)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Securing Emerging Wireless Systems - Lower-layer Approaches (Hardcover, 1st Edition.
2nd Printing. 2008): Yingying Chen,... Securing Emerging Wireless Systems - Lower-layer Approaches (Hardcover, 1st Edition. 2nd Printing. 2008)
Yingying Chen, Wenyuan Xu, Wade Trappe, YanYong Zhang
R2,704 Discovery Miles 27 040 Ships in 18 - 22 working days

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services.

The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Securing Wireless Communications at the Physical Layer (Hardcover, 2010 ed.): Ruoheng Liu, Wade Trappe Securing Wireless Communications at the Physical Layer (Hardcover, 2010 ed.)
Ruoheng Liu, Wade Trappe
R4,231 Discovery Miles 42 310 Ships in 18 - 22 working days

Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.

Network-Aware Security for Group Communications (Hardcover, 2008 ed.): Yan Sun, Wade Trappe, K.J. Ray Liu Network-Aware Security for Group Communications (Hardcover, 2008 ed.)
Yan Sun, Wade Trappe, K.J. Ray Liu
R2,822 Discovery Miles 28 220 Ships in 18 - 22 working days

Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcasts and the delivery of network control messages, will rely upon the ability to reliably deliver data simultaneously to a large group of users. As these networks become increasingly pervasive and these multi-user services become increasingly ubiquitous, it will become essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group communications.

Securing Wireless Communications at the Physical Layer (Paperback, 2010 ed.): Ruoheng Liu, Wade Trappe Securing Wireless Communications at the Physical Layer (Paperback, 2010 ed.)
Ruoheng Liu, Wade Trappe
R4,043 Discovery Miles 40 430 Ships in 18 - 22 working days

Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.

Pervasive Wireless Environments: Detecting and Localizing User Spoofing (Paperback, 2014 ed.): Jie Yang, Yingying Chen, Wade... Pervasive Wireless Environments: Detecting and Localizing User Spoofing (Paperback, 2014 ed.)
Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng
R1,571 Discovery Miles 15 710 Ships in 18 - 22 working days

This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security."

Securing Emerging Wireless Systems - Lower-layer Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2009): Yingying... Securing Emerging Wireless Systems - Lower-layer Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Yingying Chen, Wenyuan Xu, Wade Trappe, YanYong Zhang
R2,675 Discovery Miles 26 750 Ships in 18 - 22 working days

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services.

The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Network-Aware Security for Group Communications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Yan Sun, Wade Trappe,... Network-Aware Security for Group Communications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Yan Sun, Wade Trappe, K.J. Ray Liu
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications. It focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).

Introduction to Cryptography with Coding Theory (Hardcover, 2nd edition): Wade Trappe, Lawrence Washington Introduction to Cryptography with Coding Theory (Hardcover, 2nd edition)
Wade Trappe, Lawrence Washington
R5,959 Discovery Miles 59 590 Ships in 18 - 22 working days

With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. Assumes a minimal background. The level of math sophistication is equivalent to a course in linear algebra. Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL. Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm. Includes expanded discussions of block ciphers, hash functions, and multicollisions, plus additional attacks on RSA to make readers aware of the strengths and shortcomings of this popular scheme. For engineers interested in learning more about cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Poop Scoopa
R399 R278 Discovery Miles 2 780
Ultra Link UL-PM2533 Projector Bracket…
R277 Discovery Miles 2 770
Amsterdam
Christian Bale, Margot Robbie, … DVD R210 Discovery Miles 2 100
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Cable Guys Controller and Smartphone…
R499 R446 Discovery Miles 4 460
Casio LW-200-7AV Watch with 10-Year…
R999 R899 Discovery Miles 8 990
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Bestway Water Polo Frame (Colour may…
R289 R129 Discovery Miles 1 290
Tron / Tron: Legacy
Jeff Bridges, Bruce Boxleitner, … Blu-ray disc  (2)
R453 Discovery Miles 4 530
Soudal Fill and Fix Polyurethane Foam…
R409 Discovery Miles 4 090

 

Partners