skip to content
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing Preview this item
ClosePreview this item
Checking...

Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing

Author: Levente Buttyán; Jean-Pierre Hubaux
Publisher: Cambridge : Cambridge University Press, 2008.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"As wireless networking becomes almost ubiquitous, it is important to anticipate potential malicious and selfish misdeeds. This self-contained text is the first to provide a scholarly description of security and non-cooperative behavior in wireless networks." "The major networking trends are analyzed and their implications explained in terms of security and cooperation. Key problems such as cheating with identities,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Levente Buttyán; Jean-Pierre Hubaux
ISBN: 9780521873710 0521873711
OCLC Number: 166315024
Description: xvii, 485 pages : illustrations ; 25 cm
Contents: pt. I: Introduction --
pt. II: Thwarting Malicious Behavior --
pt. III: Thwarting Selfish Behavior.
Responsibility: Levente Buttyan, Jean-Pierre Hubaux.
More information:

Abstract:

The first self-contained text to consider security and non-cooperative behavior in wireless networks.  Read more...

Reviews

Editorial reviews

Publisher Synopsis

'This novel book anticipates new challenges in upcoming wireless networks. These challenges are related to human behaviour, the root of all security issues. ... Security and Cooperation in Wireless Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/166315024> # Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "166315024" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/enk> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/796242693#Place/cambridge> ; # Cambridge
   schema:about <http://experiment.worldcat.org/entity/work/data/796242693#Topic/systemes_informatiques_securite_mesures> ; # Systèmes informatiques--Sécurité--Mesures
   schema:about <http://experiment.worldcat.org/entity/work/data/796242693#Topic/cryptographie> ; # Cryptographie
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/796242693#Topic/reseaux_d_ordinateurs_securite_mesures> ; # Réseaux d'ordinateurs--Sécurité--Mesures
   schema:about <http://experiment.worldcat.org/entity/work/data/796242693#Topic/criminalite_informatique> ; # Criminalité informatique
   schema:about <http://experiment.worldcat.org/entity/work/data/796242693#Topic/securite_informatique> ; # Sécurité informatique
   schema:about <http://id.loc.gov/authorities/subjects/sh2010118631> ; # Wireless communication systems--Security measures
   schema:about <http://id.worldcat.org/fast/1176222> ; # Wireless communication systems--Security measures
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/33987087> ; # Jean-Pierre Hubaux
   schema:creator <http://viaf.org/viaf/28240466> ; # Levente Buttyán
   schema:datePublished "2008" ;
   schema:datePublished "2007" ;
   schema:description "pt. I: Introduction -- pt. II: Thwarting Malicious Behavior -- pt. III: Thwarting Selfish Behavior."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/796242693> ;
   schema:inLanguage "en" ;
   schema:name "Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing"@en ;
   schema:productID "166315024" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/166315024#PublicationEvent/cambridge_cambridge_university_press_2008> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/796242693#Agent/cambridge_university_press> ; # Cambridge University Press
   schema:reviews <http://www.worldcat.org/title/-/oclc/166315024#Review/-2108619315> ;
   schema:url <http://catdir.loc.gov/catdir/enhancements/fy0808/2008295154-t.html> ;
   schema:workExample <http://worldcat.org/isbn/9780521873710> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA766244> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/166315024> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/796242693#Agent/cambridge_university_press> # Cambridge University Press
    a bgn:Agent ;
   schema:name "Cambridge University Press" ;
    .

<http://experiment.worldcat.org/entity/work/data/796242693#Topic/criminalite_informatique> # Criminalité informatique
    a schema:Intangible ;
   schema:name "Criminalité informatique"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/796242693#Topic/reseaux_d_ordinateurs_securite_mesures> # Réseaux d'ordinateurs--Sécurité--Mesures
    a schema:Intangible ;
   schema:name "Réseaux d'ordinateurs--Sécurité--Mesures"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/796242693#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
   schema:name "Sécurité informatique"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/796242693#Topic/systemes_informatiques_securite_mesures> # Systèmes informatiques--Sécurité--Mesures
    a schema:Intangible ;
   schema:name "Systèmes informatiques--Sécurité--Mesures"@fr ;
    .

<http://id.loc.gov/authorities/subjects/sh2010118631> # Wireless communication systems--Security measures
    a schema:Intangible ;
   schema:name "Wireless communication systems--Security measures"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1176222> # Wireless communication systems--Security measures
    a schema:Intangible ;
   schema:name "Wireless communication systems--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://viaf.org/viaf/28240466> # Levente Buttyán
    a schema:Person ;
   schema:familyName "Buttyán" ;
   schema:givenName "Levente" ;
   schema:name "Levente Buttyán" ;
    .

<http://viaf.org/viaf/33987087> # Jean-Pierre Hubaux
    a schema:Person ;
   schema:familyName "Hubaux" ;
   schema:givenName "Jean-Pierre" ;
   schema:name "Jean-Pierre Hubaux" ;
    .

<http://worldcat.org/isbn/9780521873710>
    a schema:ProductModel ;
   schema:isbn "0521873711" ;
   schema:isbn "9780521873710" ;
    .

<http://www.worldcat.org/title/-/oclc/166315024>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/166315024> ; # Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
   schema:dateModified "2017-12-24" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .

<http://www.worldcat.org/title/-/oclc/166315024#Review/-2108619315>
    a schema:Review ;
   schema:itemReviewed <http://www.worldcat.org/oclc/166315024> ; # Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
   schema:reviewBody ""As wireless networking becomes almost ubiquitous, it is important to anticipate potential malicious and selfish misdeeds. This self-contained text is the first to provide a scholarly description of security and non-cooperative behavior in wireless networks." "The major networking trends are analyzed and their implications explained in terms of security and cooperation. Key problems such as cheating with identities, illegitimate access to confidential data, attacks against privacy and "stealing of bandwidth" are described along with the existing security techniques and putative methods of protection for the future. The fundamental questions of security: user and device identification; establishment of security associations; secure and cooperative routing in multi-hop network; fair bandwidth distribution; privacy protection, and so on, are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor and RFID networks. The important relationships between trust, security, and cooperation are also discussed." "End of chapter homework problems test the reader and open new directions of thought; and two tutorials in the appendices, on cryptographic protocols and game theory, provide a review of the background material required to grasp the core concepts." "Ideal for senior undergraduates and graduate students of electrical engineering and computer science, this book will also be an invaluable resource on thwarting malicious and selfish behavior for researchers and practitioners in the wireless industry."--Jacket." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.