Wireless Network Security
by admin on Nov.22, 2009, under Download, IT
CONTENTS OF Wireless Network Security
Preface
Yang Xiao, Xuemin Shen, and Ding-Zhu Du
Part I: Security in General Wireless/Mobile Networks
Part II: Security in Ad Hoc Network
Katrin Hoeper and Guang Gong
Jianping Pan, Lin Cai, and Xuemin (Sherman) Shen
Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei
Tiranuch Anantvalee and Jie Wu
Part III: Security in Mobile Cellular Networks
Part IV: Security in Wireless LANs
Minghui Shi, Humphrey Rutagemwa, Xuemin (Sherman) Shen,
Jon W. Mark, Yixin Jiang, and Chuang Lin
Part V: Security in Sensor Networks
Jelena Misic and Vojislav B. Misic
Preface
Yang Xiao, Xuemin Shen, and Ding-Zhu Du
Part I: Security in General Wireless/Mobile Networks
- Chapter 1: High Performance Elliptic Curve Cryptographic Co-processor
- Chapter 2: An Adaptive Encryption Protocol in Mobile Computing
Part II: Security in Ad Hoc Network
- Chapter 3: Pre-Authentication and Authentication Models in
Katrin Hoeper and Guang Gong
- Chapter 4: Promoting Identity-Based Key Management in
Jianping Pan, Lin Cai, and Xuemin (Sherman) Shen
- Chapter 5: A Survey of Attacks and Countermeasures in
Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei
- Chapter 6: Secure Routing in Wireless Ad-Hoc Networks
- Chapter 7: A Survey on Intrusion Detection in
Tiranuch Anantvalee and Jie Wu
Part III: Security in Mobile Cellular Networks
- Chapter 8: Intrusion Detection in Cellular Mobile Networks
- Chapter 9: The Spread of Epidemics on Smartphones
Part IV: Security in Wireless LANs
- Chapter 10: Cross-Domain Mobility-Adaptive Authentication
- Chapter 11: AAA Architecture and Authentication
Minghui Shi, Humphrey Rutagemwa, Xuemin (Sherman) Shen,
Jon W. Mark, Yixin Jiang, and Chuang Lin
- Chapter 12: An Experimental Study on Security Protocols in WLANs
Part V: Security in Sensor Networks
- Chapter 13: Security Issues in Wireless Sensor Networks
Jelena Misic and Vojislav B. Misic
- Chapter 14: Key Management Schemes in Sensor Networks
- Chapter 15: Secure Routing in Ad Hoc and Sensor Networks
0 comments