Waterloo Bridge.的留言板

富士康质检员张全蛋 2020-01-02 06:41:44
大家好,这里是我的留言板,如果有问题,欢迎大家留言,我会第一时间进行回复
...全文
166 回复 打赏 收藏 转发到动态 举报
写回复
用AI写文章
回复
切换为时间正序
请发表友善的回复…
发表回复
Preface .............................................................................................................................................xxxii Acknowledgment ...........................................................................................................................xxxiv Section I Security Fundamentals Chapter I Malicious Software in Mobile Devices ...................................................................................................1 Thomas M. Chen, Southern Methodist University, USA Cyrus Peikari, Airscanner Mobile Security Corporation, USA Chapter II Secure Service Discovery .....................................................................................................................11 Sheikh I. Ahamed, Marquette University, USA John F. Buford, Avaya Labs, USA Moushumi Sharmin, Marquette University, USA Munirul M. Haque, Marquette University, USA Nilothpal Talukder, Marquette University, USA Chapter III Security of Mobile Code .......................................................................................................................28 Zbigniew Kotulski, Polish Academy of Sciences, Warsaw, Poland Warsaw University of Technology, Poland Aneta Zwierko, Warsaw University of Technology, Poland Chapter IV Identity Management ............................................................................................................................44 Kumbesan Sandrasegaran, University of Technology, Sydney, Australia Mo Li, University of Technology, Sydney, Australia Table of Contents Chapter V Wireless Wardriving ..............................................................................................................................61 Luca Caviglione, Institute of Intelligent Systems for Automation (ISSIA)—Genoa Branch, Italian National Research Council, Italy Chapter VI Intrusion and Anomaly Detection in Wireless Networks ......................................................................78 Amel Meddeb Makhlouf, University of the 7th of November at Carthage, Tunisia Noureddine Boudriga, University of the 7th of November at Carthage, Tunisia Chapter VII Peer-to-Peer (P2P) Network Security: Firewall Issues .........................................................................95 Lu Yan, University College London, UK Chapter VIII Identity Management for Wireless Service Access .............................................................................104 Mohammad M.R. Chowdhury, University Graduate Center – UniK, Norway Josef Noll, University Graduate Center – UniK, Norway Chapter IX Privacy Enhancing Techniques: A Survey and Classification .............................................................115 Peter Langendörfer, IHP, Germany Michael Masser, IHP, Germany Krzysztof Piotrowski, IHP, Germany Steffen Peter, IHP, Germany Chapter X Vulnerability Analysis and Defenses in Wireless Networks ...............................................................129 Lawan A. Mohammad, King Fahd University of Petroleum and Minerals, Saudi Arabia Biju Issac, Swinburne University of Technology – Sarawak Campus, Malaysia Chapter XI Key Distribution and Management for Mobile Applications .............................................................145 György Kálmán, University Graduate Center – UniK, Norway Josef Noll, University Graduate Center – UniK, Norway Chapter XII Architecture and Protocols for Authentications, Authorization, and Accounting (AAA) in the Future Wireless Communications Networks ............................................................................158 Said Zaghloul, Technical University Carolo-Wilhelmina – Braunschweig, Germany Admela Jukan, Technical University Carolo-Wilhelmina – Braunschweig, Germany Chapter XIII Authentication, Authorisation, and Access Control in Mobile Systems .............................................176 Josef Noll, University Graduate Center – UniK, Norway György Kálmán, University Graduate Center – UniK, Norway Chapter XIV Trustworthy Networks, Authentication, Privacy, and Security Models ..............................................189 Yacine Djemaiel, University of the 7th of November at Carthage, Tunisia Slim Rekhis, University of the 7th of November at Carthage, Tunisia Noureddine Boudriga, University of the 7th of November at Carthage, Tunisia Chapter XV The Provably Secure Formal Methods for Authentication and Key Agreement Protocols ................210 Jianfeng Ma, Xidian University, China Xinghua Li, Xidian University, China Chapter XVI Multimedia Encryption and Watermarking in Wireless Environment ................................................236 Shiguo Lian, France Telecom R&D Beijing, China Chapter XVII System-on-Chip Design of the Whirlpool Hash Function ..................................................................256 Paris Kitsos, Hellenic Open University (HOU), Patras, Greece Section II Security in 3G/B3G/4G Chapter XVIII Security in 4G .....................................................................................................................................272 Artur Hecker, Ecole Nationale Supérieure des Télécommunications (ENST), France Mohamad Badra, National Center for Scientific Research, France Chapter XIX Security Architectures for B3G Mobile Networks ..............................................................................297 Christoforos Ntantogian, University of Athens, Greece Christos Xenakis, University of Piraeus, Greece Chapter XX Security in UMTS 3G Mobile Networks ............................................................................................318 Christos Xenakis, University of Piraeus, Greece Chapter XXI Access Security in UMTS and IMS ....................................................................................................339 Yan Zhang, Simula Research Laboratory, Norway Yifan Chen, University of Greenwich, UK Rong Yu, South China University of Technology, China Supeng Leng, University of Electronic Science and Technology of China, China Huansheng Ning, Beihang University, China Tao Jiang, Huazhong University of Science and Technology, China Chapter XXII Security in 2.5G Mobile Systems .......................................................................................................351 Christos Xenakis, University of Piraeus, Greece Chapter XXIII End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies ............................364 Sasan Adibi, University of Waterloo, Canada Gordon B. Agnew, University of Waterloo, Canada Chapter XXIV Generic Application Security in Current and Future Networks ..........................................................379 Silke Holtmanns, Nokia Research Center, Finland Pekka Laitinen, Nokia Research Center, Finland Chapter XXV Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments ........................................................................................................395 Sangheon Pack, Korea University, South Korea Sungmin Baek, Seoul National University, South Korea Taekyoung Kwon, Seoul National University, South Korea Yanghee Choi, Seoul National University, South Korea Section III Security in Ad Hoc and Sensor Networks Chapter XXVI Security in Mobile Ad Hoc Networks .................................................................................................413 Bin Lu, West Chester University, USA Chapter XXVII Privacy and Anonymity in Mobile Ad Hoc Networks ........................................................................431 Christer Andersson, Combitech, Sweden Leonardo A. Martucci, Karlstad University, Sweden Simone Fischer-Hübner, Karlstad University, Sweden Chapter XXVIII Secure Routing with Reputation in MANET ......................................................................................449 Tomasz Ciszkowski, Warsaw University, Poland Zbigniew Kotulski, Warsaw University, Poland Chapter XXIX Trust Management and Context-Driven Access Control ....................................................................461 Paolo Bellavista, University of Bologna, Italy Rebecca Montanari, University of Bologna, Italy Daniela Tibaldi, University of Bologna, Italy Alessandra Toninelli, University of Bologna, Italy Chapter XXX A Survey of Key Management in Mobile Ad Hoc Networks .............................................................479 Bing Wu, Fayetteville State University, USA Jie Wu, Florida Atlantic University, USA Mihaela Cardei, Florida Atlantic University, USA Chapter XXXI Security Measures for Mobile Ad-Hoc Networks (MANETs) ...........................................................500 Sasan Adibi, University of Waterloo, Canada Gordon B. Agnew, University of Waterloo, Canada Chapter XXXII A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks .................................515 Hao Yin, Tsinghua University, China Chuang Lin, Tsinghua University, China Zhijia Chen, Tsinghua University, China Geyong Min, University of Bradford, UK Chapter XXXIII Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks ..................................531 John Felix Charles Joseph, Nanyang Technological University, Singapore Amitabha Das, Nanyang Technological University, Singapore Boot-Chong Seet, Auckland Univerisity of Technology, New Zealand Bu-Sung Lee, Nanyang Technological University, Singapore Chapter XXXIV Security in Wireless Sensor Networks ................................................................................................547 Luis E. Palafox, CICESE Research Center, Mexico J. Antonio Garcia-Macias, CICESE Research Center, Mexico Chapter XXXV Security and Privacy in Wireless Sensor Networks: Challenges and Solutions .................................565 Mohamed Hamdi, University of November 7th at Carthage, Tunisia Noreddine Boudriga, University of November 7th at Carthage, Tunisia Chapter XXXVI Routing Security in Wireless Sensor Networks ..................................................................................582 A.R. Naseer, King Fahd University of Petroleum & Minerials, Dhahran Ismat K. Maarouf, King Fahd University of Petroleum & Minerials, Dhahran Ashraf S. Hasan, King Fahd University of Petroleum & Minerials, Dhahran Chapter XXXVII Localization Security in Wireless Sensor Networks ...........................................................................617 Yawen Wei, Iowa State University, USA Zhen Yu, Iowa State University, USA Yong Guan, Iowa State University, USA Chapter XXXVIII Resilience Against False Data Injection Attack in Wireless Sensor Networks ...................................628 Miao Ma, The Hong Kong University of Science and Technology, Hong Kong Chapter XXXIX Survivability of Sensors with Key and Trust Management ................................................................636 Jean-Marc Seigneur, University of Genev, Switzerland Luminita Moraru, University of Genev, Switzerland Olivier Powell, University of Patras, Greece Chapter XL Fault Tolerant Topology Design for Ad Hoc and Sensor Networks ...................................................652 Yu Wang, University of North Carolina at Charlotte, USA Section IV Security in Wireless PAN/LAN/MAN Networks Chapter XLI Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections ..............666 Georgios Kambourakis, University of the Aegean, Greece Angelos Rouskas, University of the Aegean, Greece Stefanos Gritzalis, University of the Aegean, Greece Chapter XLII Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring .........................................................681 Miguel A. Ruiz, University of Alcala, Spain Felipe Espinosa, University of Alcala, Spain David Sanguino, University of Alcala, Spain AbdelBaset M.H. Awawdeh, University of Alcala, Spain Chapter XLIII Security in WLAN ..............................................................................................................................695 Mohamad Badra, Bât ISIMA, France Artur Hecker, INFRES-ENST, France Chapter XLIV Access Control in Wireless Local Area Networks: Fast Authentication Schemes .............................710 Jahan Hassan, The University of Sydney, Australia Björn Landfeldt, The University of Sydney, Australia Albert Y. Zomaya, The University of Sydney, Australia Chapter XLV Security and Privacy in RFID Based Wireless Networks ...................................................................723 Denis Trček, University of Ljubljana, Slovenia Chapter XLVI Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANS) ......................................................................................................732 Giorgos Kostopoulos, University of Patras, Greece Nicolas Sklavos, Technological Educational Institute of Mesolonghi, Greece Odysseas Koufopavlou, University of Patras, Greece Chapter XLVII End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications ...........................................747 Sasan Adibi, University of Waterloo, Canada Gordon B. Agnew, University of Waterloo, Canada Tom Tofigh, WiMAX Forum, USA Chapter XLVIII Evaluation of Security Architectures for Mobile Broadband Access .................................................759 Symeon Chatzinotas, University of Surrey, UK Jonny Karlsson, Arcada University of Applied Sciences, Finland Göran Pulkkis, Arcada University of Applied Sciences, Finland Kaj Grahn, Arcada University of Applied Sciences, Finland

594

社区成员

发帖
与我相关
我的任务
社区描述
提出问题
其他 技术论坛(原bbs)
社区管理员
  • community_281
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告
暂无公告

试试用AI创作助手写篇文章吧