
Corona virus: Access only with medical mouth-nose protection, limited access to reading rooms
Please respect the known hygiene rules and prevent long stays in the library!
► More information about opening hours and visiting the library you find in our FAQ
Challenges and Solutions: Basic Issues (English)
- New search for: Çayirci, Erdal
- New search for: Rong, Chunming
In:
Security in Wireless Ad Hoc and Sensor Networks
;
143-172
;
2009
-
ISBN:
- Article/Chapter (Book) / Electronic Resource
-
Title:Challenges and Solutions: Basic Issues
-
Author / Creator:
-
Published in:
-
Publisher:John Wiley & Sons, Ltd
-
Place of publication:Chichester, UK
-
Year of publication:2009
-
Size:30 pages
-
ISBN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:security challenges and wireless ad hoc and sensor networks, node communication authentication using security associations, wireless ad hoc network bootstrapping security, key management schemes, Certificate‐based public key schemes, Secure and Efficient Key Management (SEKM), Mobility‐Based Key Management Scheme (MOB), key predistribution scheme ‐ key predistribution, shared‐key discovery, path key establishment, Self‐Healing Session Key Distribution (S‐HEAL), two‐party communication case and message authentication code (MAC)
-
Source:
-
Export:
-
ORKG:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
IntroductionÇayirci, Erdal / Rong, Chunming | 2009
- 9
-
Wireless Ad Hoc, Sensor and Mesh NetworksÇayirci, Erdal / Rong, Chunming | 2009
- 29
-
The Wireless MediumÇayirci, Erdal / Rong, Chunming | 2009
- 47
-
Medium Access and Error ControlÇayirci, Erdal / Rong, Chunming | 2009
- 65
-
RoutingÇayirci, Erdal / Rong, Chunming | 2009
- 81
-
Reliability, Flow and Congestion ControlÇayirci, Erdal / Rong, Chunming | 2009
- 89
-
Other Challenges and Security AspectsÇayirci, Erdal / Rong, Chunming | 2009
- 105
-
Security Attacks in Ad Hoc, Sensor and Mesh NetworksÇayirci, Erdal / Rong, Chunming | 2009
- 121
-
CryptographyÇayirci, Erdal / Rong, Chunming | 2009
- 143
-
Challenges and Solutions: Basic IssuesÇayirci, Erdal / Rong, Chunming | 2009
- 173
-
Challenges and Solutions: ProtectionÇayirci, Erdal / Rong, Chunming | 2009
- 187
-
Secure RoutingÇayirci, Erdal / Rong, Chunming | 2009
- 203
-
Specific Challenges and SolutionsÇayirci, Erdal / Rong, Chunming | 2009
- 221
-
Information Operations and Electronic WarfareÇayirci, Erdal / Rong, Chunming | 2009
- 227
-
StandardsÇayirci, Erdal / Rong, Chunming | 2009
- 245
-
ReferencesÇayirci, Erdal / Rong, Chunming | 2009
- 253
-
IndexÇayirci, Erdal / Rong, Chunming | 2009
- i
-
Front MatterÇayirci, Erdal / Rong, Chunming | 2009