[ Pobierz całość w formacie PDF ]
Handbook of Research on
Wireless Security
Yan Zhang
Simula Research Laboratory, Norway
Jun Zheng
City University of New York, USA
Miao Ma
Hong Kong University of Science and Technology, Hong Kong
Volume I
InformatIon scIence reference
Hershey • New York
Acquisitions Editor:
Kristin Klinger
Development Editor:
Kristin Roth
Senior Managing Editor:
Jennifer Neidig
Managing Editor:
Sara Reed
Copy Editor:
Ashlee Kunkel, Holly J. Powell
Typesetter:
Jamie Snavely, Carole Coulson
Cover Design:
Lisa Tosheff
Printed at:
Yurchak Printing Inc.
Published in the United States of America by
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue, Suite 200
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-global.com
Web site: http://www.igi-global.com
and in the United Kingdom by
Information Science Reference (an imprint of IGI Global)
3 Henrietta Street
Covent Garden
London WC2E 8LU
Tel: 44 20 7240 0856
Fax: 44 20 7379 0609
Web site: http://www.eurospanonline.com
Copyright © 2008 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by
any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identiication purposes only. Inclusion of the names of the products or companies does
not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
Library of Congress Cataloging-in-Publication Data
Handbook of research on wireless security / Yan Zhang, Jun Zheng, and Miao Ma, editors.
p. cm.
Summary: “This book combines research from esteemed experts on security issues in various wireless communications, recent advances
in wireless security, the wireless security model, and future directions in wireless security. As an innovative reference source for students,
educators, faculty members, researchers, engineers in the ield of wireless security, it will make an invaluable addition to any library
collection”--Provided by publisher.
Includes bibliographical references and index.
ISBN 978-1-59904-899-4 (hardcover) -- ISBN 978-1-59904-900-7 (ebook)
1. Wireless communication systems--Security measures. I. Zhang, Yan, 1962- II. Zheng, Jun, Ph.D. III. Ma, Miao. IV. Title.
TK5102.85.H35 2008
005.8--dc22
2007036301
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.
All work contributed to this book set is original material. The views expressed in this book are those of the authors, but not necessarily of
the publisher.
If a library purchased a print copy of this publication, please go to http://www.igi-global.com/reference/assets/IGR-eAccess-agreement.
pdf for information on activating the library's complimentary electronic access to this publication.
Editorial Advisory Board
Hsiao-Hwa Chen
National Sun Yat-Sen University, Taiwan
Soong Boon Hee
Nanyang Technological University, Singapore
Ibrahim Habib
City University of New York, USA
Javier Barria
Imperial College, UK
Robert Deng Huijie
Singapore Management University, Singapore
Jie Wu
Florida Atlantic University, USA
Mieso Denko
University of Guelph, Canada
Laurence T. Yang
St. Francis Xavier University, Canada
Shahram Latii
University of Nevada, USA
Paolo Bellavista
DEIS - Università degli Studi di Bologna, Italy
Ismail Khalil Ibrahim
Johannes Kepler University Linz, Austria
Table of Contents
Preface
............................................................................................................................................. xxxii
Acknowledgment
........................................................................................................................... xxxiv
Section I
Security Fundamentals
Chapter I
Malicious Software in Mobile Devices
...................................................................................................
1
Thomas M. Chen,
Southern Methodist University, USA
Cyrus Peikari,
Airscanner Mobile Security Corporation, USA
Chapter II
Secure Service Discovery
.....................................................................................................................
11
Sheikh I. Ahamed,
Marquette University, USA
John F. Buford,
Avaya Labs, USA
Moushumi Sharmin,
Marquette University, USA
Munirul M. Haque,
Marquette University, USA
Nilothpal Talukder,
Marquette University, USA
Chapter III
Security of Mobile Code
.......................................................................................................................
28
Zbigniew Kotulski,
Polish Academy of Sciences, Warsaw, Poland
Warsaw University of Technology, Poland
Aneta Zwierko,
Warsaw University of Technology, Poland
Chapter IV
Identity Management
............................................................................................................................
44
Kumbesan Sandrasegaran,
University of Technology, Sydney, Australia
Mo Li,
University of Technology, Sydney, Australia
[ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • amelia.pev.pl