This volume is the fourth part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 62 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are the papers of the Workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp2011), of the Workshop on Multimedia Streaming (MultiStreams2011), and of the Workshop on Trust...
This volume is the fourth part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the Fir...
Providing broad coverage of the security issues facing multihop wireless networks, this book explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, it covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, intrusion detection, security performance analysis, and security issues in applications and more.
Providing broad coverage of the security issues facing multihop wireless networks, this book explores security in mobile ad hoc networks, wireless sen...
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013. The 36 revised full papers presented together with 12 work-in-progress papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on security and privacy in networked systems; authentication and access control systems; encryption and cryptography; system and network security; work-in-progress.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, I...
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access...
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenti...