Handbook of Research on Wireless Security

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.csdn.net/topmvp - topmvp

Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society.

The Handbook of Research on Wireless Security combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative and current reference source for students, educators, faculty members, researchers, engineers in the field of wireless security, this handbook will make an invaluable addition to any library collection.


http://rapidshare.com/files/111218456/159904899X.rar
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Preface .............................................................................................................................................xxxii Acknowledgment ...........................................................................................................................xxxiv Section I Security Fundamentals Chapter I Malicious Software in Mobile Devices ...................................................................................................1 Thomas M. Chen, Southern Methodist University, USA Cyrus Peikari, Airscanner Mobile Security Corporation, USA Chapter II Secure Service Discovery .....................................................................................................................11 Sheikh I. Ahamed, Marquette University, USA John F. Buford, Avaya Labs, USA Moushumi Sharmin, Marquette University, USA Munirul M. Haque, Marquette University, USA Nilothpal Talukder, Marquette University, USA Chapter III Security of Mobile Code .......................................................................................................................28 Zbigniew Kotulski, Polish Academy of Sciences, Warsaw, Poland Warsaw University of Technology, Poland Aneta Zwierko, Warsaw University of Technology, Poland Chapter IV Identity Management ............................................................................................................................44 Kumbesan Sandrasegaran, University of Technology, Sydney, Australia Mo Li, University of Technology, Sydney, Australia Table of Contents Chapter V Wireless Wardriving ..............................................................................................................................61 Luca Caviglione, Institute of Intelligent Systems for Automation (ISSIA)—Genoa Branch, Italian National Research Council, Italy Chapter VI Intrusion and Anomaly Detection in Wireless Networks ......................................................................78 Amel Meddeb Makhlouf, University of the 7th of November at Carthage, Tunisia Noureddine Boudriga, University of the 7th of November at Carthage, Tunisia Chapter VII Peer-to-Peer (P2P) Network Security: Firewall Issues .........................................................................95 Lu Yan, University College London, UK Chapter VIII Identity Management for Wireless Service Access .............................................................................104 Mohammad M.R. Chowdhury, University Graduate Center – UniK, Norway Josef Noll, University Graduate Center – UniK, Norway Chapter IX Privacy Enhancing Techniques: A Survey and Classification .............................................................115 Peter Langendörfer, IHP, Germany Michael Masser, IHP, Germany Krzysztof Piotrowski, IHP, Germany Steffen Peter, IHP, Germany Chapter X Vulnerability Analysis and Defenses in Wireless Networks ...............................................................129 Lawan A. Mohammad, King Fahd University of Petroleum and Minerals, Saudi Arabia Biju Issac, Swinburne University of Technology – Sarawak Campus, Malaysia Chapter XI Key Distribution and Management for Mobile Applications .............................................................145 György Kálmán, University Graduate Center – UniK, Norway Josef Noll, University Graduate Center – UniK, Norway Chapter XII Architecture and Protocols for Authentications, Authorization, and Accounting (AAA) in the Future Wireless Communications Networks ............................................................................158 Said Zaghloul, Technical University Carolo-Wilhelmina – Braunschweig, Germany Admela Jukan, Technical University Carolo-Wilhelmina – Braunschweig, Germany Chapter XIII Authentication, Authorisation, and Access Control in Mobile Systems .............................................176 Josef Noll, University Graduate Center – UniK, Norway György Kálmán, University Graduate Center – UniK, Norway Chapter XIV Trustworthy Networks, Authentication, Privacy, and Security Models ..............................................189 Yacine Djemaiel, University of the 7th of November at Carthage, Tunisia Slim Rekhis, University of the 7th of November at Carthage, Tunisia Noureddine Boudriga, University of the 7th of November at Carthage, Tunisia Chapter XV The Provably Secure Formal Methods for Authentication and Key Agreement Protocols ................210 Jianfeng Ma, Xidian University, China Xinghua Li, Xidian University, China Chapter XVI Multimedia Encryption and Watermarking in Wireless Environment ................................................236 Shiguo Lian, France Telecom R&D Beijing, China Chapter XVII System-on-Chip Design of the Whirlpool Hash Function ..................................................................256 Paris Kitsos, Hellenic Open University (HOU), Patras, Greece Section II Security in 3G/B3G/4G Chapter XVIII Security in 4G .....................................................................................................................................272 Artur Hecker, Ecole Nationale Supérieure des Télécommunications (ENST), France Mohamad Badra, National Center for Scientific Research, France Chapter XIX Security Architectures for B3G Mobile Networks ..............................................................................297 Christoforos Ntantogian, University of Athens, Greece Christos Xenakis, University of Piraeus, Greece Chapter XX Security in UMTS 3G Mobile Networks ............................................................................................318 Christos Xenakis, University of Piraeus, Greece Chapter XXI Access Security in UMTS and IMS ....................................................................................................339 Yan Zhang, Simula Research Laboratory, Norway Yifan Chen, University of Greenwich, UK Rong Yu, South China University of Technology, China Supeng Leng, University of Electronic Science and Technology of China, China Huansheng Ning, Beihang University, China Tao Jiang, Huazhong University of Science and Technology, China Chapter XXII Security in 2.5G Mobile Systems .......................................................................................................351 Christos Xenakis, University of Piraeus, Greece Chapter XXIII End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies ............................364 Sasan Adibi, University of Waterloo, Canada Gordon B. Agnew, University of Waterloo, Canada Chapter XXIV Generic Application Security in Current and Future Networks ..........................................................379 Silke Holtmanns, Nokia Research Center, Finland Pekka Laitinen, Nokia Research Center, Finland Chapter XXV Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments ........................................................................................................395 Sangheon Pack, Korea University, South Korea Sungmin Baek, Seoul National University, South Korea Taekyoung Kwon, Seoul National University, South Korea Yanghee Choi, Seoul National University, South Korea Section III Security in Ad Hoc and Sensor Networks Chapter XXVI Security in Mobile Ad Hoc Networks .................................................................................................413 Bin Lu, West Chester University, USA Chapter XXVII Privacy and Anonymity in Mobile Ad Hoc Networks ........................................................................431 Christer Andersson, Combitech, Sweden Leonardo A. Martucci, Karlstad University, Sweden Simone Fischer-Hübner, Karlstad University, Sweden Chapter XXVIII Secure Routing with Reputation in MANET ......................................................................................449 Tomasz Ciszkowski, Warsaw University, Poland Zbigniew Kotulski, Warsaw University, Poland Chapter XXIX Trust Management and Context-Driven Access Control ....................................................................461 Paolo Bellavista, University of Bologna, Italy Rebecca Montanari, University of Bologna, Italy Daniela Tibaldi, University of Bologna, Italy Alessandra Toninelli, University of Bologna, Italy Chapter XXX A Survey of Key Management in Mobile Ad Hoc Networks .............................................................479 Bing Wu, Fayetteville State University, USA Jie Wu, Florida Atlantic University, USA Mihaela Cardei, Florida Atlantic University, USA Chapter XXXI Security Measures for Mobile Ad-Hoc Networks (MANETs) ...........................................................500 Sasan Adibi, University of Waterloo, Canada Gordon B. Agnew, University of Waterloo, Canada Chapter XXXII A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks .................................515 Hao Yin, Tsinghua University, China Chuang Lin, Tsinghua University, China Zhijia Chen, Tsinghua University, China Geyong Min, University of Bradford, UK Chapter XXXIII Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks ..................................531 John Felix Charles Joseph, Nanyang Technological University, Singapore Amitabha Das, Nanyang Technological University, Singapore Boot-Chong Seet, Auckland Univerisity of Technology, New Zealand Bu-Sung Lee, Nanyang Technological University, Singapore Chapter XXXIV Security in Wireless Sensor Networks ................................................................................................547 Luis E. Palafox, CICESE Research Center, Mexico J. Antonio Garcia-Macias, CICESE Research Center, Mexico Chapter XXXV Security and Privacy in Wireless Sensor Networks: Challenges and Solutions .................................565 Mohamed Hamdi, University of November 7th at Carthage, Tunisia Noreddine Boudriga, University of November 7th at Carthage, Tunisia Chapter XXXVI Routing Security in Wireless Sensor Networks ..................................................................................582 A.R. Naseer, King Fahd University of Petroleum & Minerials, Dhahran Ismat K. Maarouf, King Fahd University of Petroleum & Minerials, Dhahran Ashraf S. Hasan, King Fahd University of Petroleum & Minerials, Dhahran Chapter XXXVII Localization Security in Wireless Sensor Networks ...........................................................................617 Yawen Wei, Iowa State University, USA Zhen Yu, Iowa State University, USA Yong Guan, Iowa State University, USA Chapter XXXVIII Resilience Against False Data Injection Attack in Wireless Sensor Networks ...................................628 Miao Ma, The Hong Kong University of Science and Technology, Hong Kong Chapter XXXIX Survivability of Sensors with Key and Trust Management ................................................................636 Jean-Marc Seigneur, University of Genev, Switzerland Luminita Moraru, University of Genev, Switzerland Olivier Powell, University of Patras, Greece Chapter XL Fault Tolerant Topology Design for Ad Hoc and Sensor Networks ...................................................652 Yu Wang, University of North Carolina at Charlotte, USA Section IV Security in Wireless PAN/LAN/MAN Networks Chapter XLI Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections ..............666 Georgios Kambourakis, University of the Aegean, Greece Angelos Rouskas, University of the Aegean, Greece Stefanos Gritzalis, University of the Aegean, Greece Chapter XLII Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring .........................................................681 Miguel A. Ruiz, University of Alcala, Spain Felipe Espinosa, University of Alcala, Spain David Sanguino, University of Alcala, Spain AbdelBaset M.H. Awawdeh, University of Alcala, Spain Chapter XLIII Security in WLAN ..............................................................................................................................695 Mohamad Badra, Bât ISIMA, France Artur Hecker, INFRES-ENST, France Chapter XLIV Access Control in Wireless Local Area Networks: Fast Authentication Schemes .............................710 Jahan Hassan, The University of Sydney, Australia Björn Landfeldt, The University of Sydney, Australia Albert Y. Zomaya, The University of Sydney, Australia Chapter XLV Security and Privacy in RFID Based Wireless Networks ...................................................................723 Denis Trček, University of Ljubljana, Slovenia Chapter XLVI Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANS) ......................................................................................................732 Giorgos Kostopoulos, University of Patras, Greece Nicolas Sklavos, Technological Educational Institute of Mesolonghi, Greece Odysseas Koufopavlou, University of Patras, Greece Chapter XLVII End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications ...........................................747 Sasan Adibi, University of Waterloo, Canada Gordon B. Agnew, University of Waterloo, Canada Tom Tofigh, WiMAX Forum, USA Chapter XLVIII Evaluation of Security Architectures for Mobile Broadband Access .................................................759 Symeon Chatzinotas, University of Surrey, UK Jonny Karlsson, Arcada University of Applied Sciences, Finland Göran Pulkkis, Arcada University of Applied Sciences, Finland Kaj Grahn, Arcada University of Applied Sciences, Finland
机器学习是一种人工智能(AI)的子领域,致力于研究如何利用数据和算法让计算机系统具备学习能力,从而能够自动地完成特定任务或者改进自身性能。机器学习的核心思想是让计算机系统通过学习数据中的模式和规律来实现目标,而不需要显式地编程。 机器学习应用非常广泛,包括但不限于以下领域: 图像识别和计算机视觉: 机器学习在图像识别、目标检测、人脸识别、图像分割等方面有着广泛的应用。例如,通过深度学习技术,可以训练神经网络来识别图像中的对象、人脸或者场景,用于智能监控、自动驾驶、医学影像分析等领域。 自然语言处理: 机器学习在自然语言处理领域有着重要的应用,包括文本分类、情感分析、机器翻译、语音识别等。例如,通过深度学习模型,可以训练神经网络来理解和生成自然语言,用于智能客服、智能助手、机器翻译等场景。 推荐系统: 推荐系统利用机器学习算法分析用户的行为和偏好,为用户推荐个性化的产品或服务。例如,电商网站可以利用机器学习算法分析用户的购买历史和浏览行为,向用户推荐感兴趣的商品。 预测和预测分析: 机器学习可以用于预测未来事件的发生概率或者趋势。例如,金融领域可以利用机器学习算法进行股票价格预测、信用评分、欺诈检测等。 医疗诊断和生物信息学: 机器学习在医疗诊断、药物研发、基因组学等领域有着重要的应用。例如,可以利用机器学习算法分析医学影像数据进行疾病诊断,或者利用机器学习算法分析基因数据进行疾病风险预测。 智能交通和物联网: 机器学习可以应用于智能交通系统、智能城市管理和物联网等领域。例如,可以利用机器学习算法分析交通数据优化交通流量,或者利用机器学习算法分析传感器数据监测设备状态。 以上仅是机器学习应用的一部分,随着机器学习技术的不断发展和应用场景的不断拓展,机器学习在各个领域都有着重要的应用价值,并且正在改变我们的生活和工作方式。
《研究综述与荟萃分析手册》(The Handbook of Research Synthesis and Meta-Analysis)是由Harris Cooper、Larry V. Hedges和Jeffrey C. Valentine合著的权威学术著作。该手册对研究综述和荟萃分析这两种重要的研究方法进行了全面的介绍。 研究综述是通过分析已有的研究文献,总结已有研究的科学证据,并提供决策者和实践者重要的参考。而荟萃分析是一种统计方法,通过整合不同研究的结果来解决特定问题或验证科学假设。这本手册详细介绍了这两种研究方法的理论、操作步骤和数据处理技巧。 《研究综述与荟萃分析手册》分为多个章节,主要包括: 1. 研究综述和荟萃分析的概述,介绍了这两种方法的背景、历史和意义; 2. 研究设计和文献检索,讲解了如何选择适当的研究设计和搜索相关文献; 3. 数据收集和效度评估,提供了从已有研究中收集和合并数据的方法,并介绍了如何评估研究的有效性和可靠性; 4. 荟萃分析的统计技术,解释了荟萃分析中常用的统计方法和模型; 5. 荟萃分析的解释和应用,讨论了如何解释荟萃分析结果并将其应用于实际问题。 这本手册是研究综述和荟萃分析领域的经典著作,被广泛应用于教育、心理学、医学等多个学科领域的研究。它为研究者和决策者提供了一种科学、系统、可靠的方法来综合和评估已有研究的结果,对推动学科的发展和实践工作的改进具有重要意义。无论是想要进行研究综述还是荟萃分析的学者,都能从这本手册中获得宝贵的指导和方法。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值