1325 results in Communications, Information Theory and Security
12 - WDM ring networks
- from Part III - Optical metropolitan area networks
-
- Book:
- Optical Switching Networks
- Published online:
- 10 May 2010
- Print publication:
- 11 February 2008, pp 174-193
-
- Chapter
- Export citation
Part III - Thwarting selfish behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 273-274
-
- Chapter
- Export citation
Acknowledgements
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp xvi-xviii
-
- Chapter
- Export citation
References
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 458-478
-
- Chapter
- Export citation
Contents
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp vii-x
-
- Chapter
- Export citation
Security and Cooperation in Wireless Networks
- Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing
-
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007
6 - Securing neighbor discovery
- from Part II - Thwarting malicious behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 141-168
-
- Chapter
- Export citation
Appendix B - A tutorial on game theory for wireless networks
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 423-457
-
- Chapter
- Export citation
1 - The security of existing wireless networks
- from Part I - Introduction
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 3-32
-
- Chapter
- Export citation
10 - Selfishness in packet forwarding
- from Part III - Thwarting selfish behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 331-349
-
- Chapter
- Export citation
Index
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 479-485
-
- Chapter
- Export citation
4 - Naming and addressing
- from Part II - Thwarting malicious behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 85-102
-
- Chapter
- Export citation
11 - Wireless operators in a shared spectrum
- from Part III - Thwarting selfish behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 350-378
-
- Chapter
- Export citation
5 - Establishment of security associations
- from Part II - Thwarting malicious behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 103-140
-
- Chapter
- Export citation
12 - Secure protocols for behavior enforcement
- from Part III - Thwarting selfish behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 379-392
-
- Chapter
- Export citation
3 - Trust assumptions and adversary models
- from Part I - Introduction
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 74-82
-
- Chapter
- Export citation
8 - Privacy protection
- from Part II - Thwarting malicious behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 237-272
-
- Chapter
- Export citation
9 - Selfish behavior at the MAC layer of CSMA/CA
- from Part III - Thwarting selfish behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 275-330
-
- Chapter
- Export citation
Appendix A - Introduction to cryptographic algorithms and protocols
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 393-422
-
- Chapter
- Export citation
7 - Secure routing in multi-hop wireless networks
- from Part II - Thwarting malicious behavior
-
- Book:
- Security and Cooperation in Wireless Networks
- Published online:
- 05 June 2012
- Print publication:
- 29 November 2007, pp 169-236
-
- Chapter
- Export citation