1 - 9
1. Primality and cryptography [1986]
- Kranakis, Evangelos.
- Chichester [Sussex] ; New York : Wiley, c1986.
- Description
- Book — xv, 235 p. ; 24 cm.
- Summary
-
- Number Theory. Primality Tests. Probability Theory. Pseudorandom Generators. Public Key Cryptosystems. Towards a General Theory. References. Frequently Used Notation. Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5102.5 .K66 1986 | Available |
- Heidelberg ; New York : Springer, ©2013.
- Description
- Book — 1 online resource (xvi, 409 pages) : illustrations Digital: text file.PDF.
- Summary
-
- FINANCIAL NETWORKS:
- 1. Mathematical modeling of systemic risk: H. Amini, A. Minca.-
- 2. Systemic risk in banking networks without Monte Carlo simulation: J. P. Gleeson, T. R. Hurd, S. Melnik, A. Hackett.-
- 3. Systemic Valuation of Banks - Interbank Equilibrium and Contagion: G. Halaj.-
- 4. An Open Problem: J. B. Walsh.- II SECURITY NETWORKS:
- 5. Dynamic Trust Management: Network Profiling for High Assurance Resilience: M. Burmester , W. O. Redwood.-
- 6. Security Issues in Link State Routing Protocols for MANETs: G.Cervera, M.Barbeau, J. Garcia-Alfaro, E.Kranakis.
- -7. TCHo: a Code-based Cryptosystem: A. Duc , S. Vaudenay.-
- 8. Formal Method for (k)-Neighborhood Discovery Protocols: R.Jamet, P.Lafourcade.-
- 9. A Tutorial on White-box AES: J. A. Muir.-
- 10. Efficient 1-Round Almost-Perfect Secure Message Transmission Protocols with Flexible Connectivity: R. Safavi-Naini, M. Ashraful Alam Tuhin.- III SOCIAL NETWORKS:
- 11. Mathematical modelling to evaluate measures and control the spread of illicit drug use: A. Bakhtiari, A. Rutherford.-
- 12. Complex Networks and Social Networks: A. Bonato, A. Tian.-
- 13. NAVEL Gazing: Studying a Networked Scholarly Organization: D. Dimitrova, A. Gruzd, Z.Hayat, G. Ying Mo, D.Mok, Th. Robbins, B.Wellman, X. Zhuo.-
- 14. How Al Qaeda can use order theory to evade or defeat U.S. Forces: J.D.Farley.-
- 15. The ABCs of Designing Social Networks for Health Behaviour Change: The VivoSpace Social Network: N. Kamal, S. Fels, M. Blackstock, K. Ho.-
- 16. Evolution of an Open Source Community Network: N. Saraf, A. Seary, D. Chandrasekaran, P.Monge.-
- 17. SociQL: A Query Language for the SocialWeb: D. Serrano, E. Stroulia, D. Barbosa, V. Guana.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
3. Principles of ad hoc networking [2007]
- Barbeau, Michel (Computer scientist)
- Chichester, England ; Hoboken, NJ : John Wiley & Sons Ltd., c2007.
- Description
- Book — xx, 254 p. : ill. ; 25 cm.
- Summary
-
- Preface.Glossary
- .1. Wireless Data Communications.1.1 Signal Representation.1.2 Analog to Digital Conversion.1.3 Digital to Analog Conversion.1.4 Architecture of an SDR Application.1.5 Quadrature Modulation and Demodulation.1.6 Spread Spectrum.1.7 Antenna.1.8 Propagation.1.9 Ultrawideband.1.10 Energy Management.1.11 Exercise
- .2. Medium Access Control.2.1 Fundamentals of Probability and Statistics.2.2 Modeling Traffic.2.3 Multiple Access.2.4 Demand Assigned Multiple Access.2.5 Carrier Sense Multiple Access in IEEE 802.11.2.6 Medium Access Control in ad hov Networks.2.7 Bibliographic Comments.2.8 Exercises
- .3. Ad Hov Wireless Access.3.1 Management of Bluetooth Networks.3.2 Model for Node Discovery in Bluetooth.3.3 Bluetooth Formation Algorithms.3.4 Mesh Mode of WiMAX/802.16.3.5 Bibliographic Comments.Exercises
- .4. Wireless Network Programming.4.1 Structure of Information.4.2 Socket.4.3 Parameters and Control.4.4 Receiving Frames.4.5 Sending Frames.4.6 Exercises
- .5. Ad Hov Networks Protocols.5.1 Normal IP Routing.5.2 The Reactive Approach.5.3 The Proactive Approach.5.4 The Hybrid Approach.5.5 Clustering.5.6 Quality of Service.5.7 Sensor Network Protocols.5.8 Exercises
- .6. Location Awareness.6.1 Geographic Proximity.6.2 Constructing Spanners of ad hov Networks.6.3 Information Dissemination.6.4 Geographic Location Determination.6.5 Random Unit Disc Graphs.6.6 Coverage and Connectivity with Directional Sensors.6.7 Bibliographic Comments.6.8 Exercises
- .7. Ad Hov Networks Security.7.1 Authentication Techniques.7.2 Physical Layer Attacks.7.3 Security of Application Protocols.7.4 Biometrics-based Key Establishment.7.5 Routing Security.7.6 Broadcast Security.7.7 Secure Location Verification.7.8 Security in Directional Antenna Systems.7.9 Bibliographic Comments.7.10 Exercises.Bibliography.Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5103.2 .B367 2007 | Available |
- ADHOC-NOW (Conference) (6th : 2007 : Morelia, Michoacán de Ocampo, Mexico)
- Berlin ; New York : Springer, ©2007.
- Description
- Book — 1 online resource (x, 284 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Routing.- Local Routing on Tori.- Topology Control and Geographic Routing in Realistic Wireless Networks.- Routing in Wireless Networks with Position Trees.- Statistical Monitoring to Control a Proactive Routing Protocol.- Topology Control.- A Faster Distributed Approximation Scheme for the Connected Dominating Set Problem for Growth-Bounded Graphs.- Coordinating Concurrent Transmissions: A Constant-Factor Approximation of Maximum-Weight Independent Set in Local Conflict Graphs.- Information Brokerage Via Location-Free Double Rulings.- Level Set Estimation Using Uncoordinated Mobile Sensors.- The Impact of Delay in Dominating Set and Neighbor Elimination Based Broadcasting in Ad Hoc Networks.- Security and Privacy.- Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation.- Dependable and Secure Distributed Storage System for Ad Hoc Networks.- An Energy and Communication Efficient Group Key in Sensor Networks Using Elliptic Curve Polynomial.- Protocols.- A Cooperative CDMA-Based Multi-channel MAC Protocol for Ad Hoc Networks.- FDAR: A Load-Balanced Routing Scheme for Mobile Ad-Hoc Networks.- TOLB: A Traffic-Oblivious Load-Balancing Protocol for Next-Generation Sensornets.- A Comparative Analysis of Multicast Protocols for Small MANET Groups.- ODCP: An On-Demand Clustering Protocol for Directed Diffusion.- Quality of Service and Performance.- Quality of Service Support for ODMRP Multicast Routing in Ad Hoc Networks.- The Analysis of Fault Tolerance in Triangular Topology Sensor Networks.- Performance Modeling of Mobile Sensor Networks.- Electronic-Oriented IP Address Auto-Configuration Protocol for MANET.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- ADHOC-NOW (Conference) (6th : 2007 : Morelia, Michoacán de Ocampo, Mexico)
- Berlin ; New York : Springer, c2007.
- Description
- Book — x, 284 p. : ill.
- Summary
-
- Routing.- Local Routing on Tori.- Topology Control and Geographic Routing in Realistic Wireless Networks.- Routing in Wireless Networks with Position Trees.- Statistical Monitoring to Control a Proactive Routing Protocol.- Topology Control.- A Faster Distributed Approximation Scheme for the Connected Dominating Set Problem for Growth-Bounded Graphs.- Coordinating Concurrent Transmissions: A Constant-Factor Approximation of Maximum-Weight Independent Set in Local Conflict Graphs.- Information Brokerage Via Location-Free Double Rulings.- Level Set Estimation Using Uncoordinated Mobile Sensors.- The Impact of Delay in Dominating Set and Neighbor Elimination Based Broadcasting in Ad Hoc Networks.- Security and Privacy.- Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation.- Dependable and Secure Distributed Storage System for Ad Hoc Networks.- An Energy and Communication Efficient Group Key in Sensor Networks Using Elliptic Curve Polynomial.- Protocols.- A Cooperative CDMA-Based Multi-channel MAC Protocol for Ad Hoc Networks.- FDAR: A Load-Balanced Routing Scheme for Mobile Ad-Hoc Networks.- TOLB: A Traffic-Oblivious Load-Balancing Protocol for Next-Generation Sensornets.- A Comparative Analysis of Multicast Protocols for Small MANET Groups.- ODCP: An On-Demand Clustering Protocol for Directed Diffusion.- Quality of Service and Performance.- Quality of Service Support for ODMRP Multicast Routing in Ad Hoc Networks.- The Analysis of Fault Tolerance in Triangular Topology Sensor Networks.- Performance Modeling of Mobile Sensor Networks.- Electronic-Oriented IP Address Auto-Configuration Protocol for MANET.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- ADHOC-NOW (Conference) (2nd : 2003 : Montréal, Québec)
- Berlin ; New York : Springer-Verlag, c2003.
- Description
- Book — x, 292 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the refereed proceedings of the Second International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2003, held in Montreal, Canada in October 2003.The 23 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 42 submissions. All current aspects of ad-hoc networking, mobile, wireless, and cooperating communication systems are addressed including network architectures, access control and discovery, multicasting protocols, performance, quality of service, QoS, routing protocols, scalability, security, and self-configuration.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK6570 .M6 A34 2003 | Available |
- ADHOC-NOW (Conference) (3rd : 2004 : Vancouver, B.C.)
- Berlin : Springer, 2004.
- Description
- Book — ix, 344 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the refereed proceedings of the Third International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2004, held in Vancouver, Canada in July 2004. The 22 revised full papers and 8 revised short papers presented were carefully reviewed and selected from more than 150 submissions. All current aspects of ad-hoc networking, sensor networks, mobile, wireless, and cooperating communication systems are addressed including, multicast, broadcast, performance, QoS, routing protocols, scalability, security, hybrid networks, self-organization, auto-configuration, energy consumption, peer-to-peer systems, and MAC protocols.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK6570 .M6 A34 2004 | Available |
- ALGOSENSORS (Symposium) (9th : 2013 : Sophia Antipolis, France)
- Berlin : Springer, 2014.
- Description
- Book — 1 online resource (x, 307 pages) : illustrations Digital: text file; PDF.
- Summary
-
- Modeling Reality Algorithmically: The Case of Wireless Communication.- Autonomous Mobile Robots: A Distributed Computing.- Token Dissemination in Geometric Dynamic Networks.- The Wake Up Dominating Set.- Reconfiguring Massive Particle Swarms with Limited, Global Control.- Polygon-Constrained motion planning problems.- Fast Localized Sensor Self-Deployment for Focused Coverage.- Minimal Solvers for Unsynchronized TDOA Sensor Network Calibration.- Data-Delivery by Energy-Constrained Mobile Robots.- Approximation Bounds for the Minimum k-Storage Problem.- Counting in Anonymous Dynamic Networks: An Experimental Perspective.- Station Assignment with Applications to Sensing.- On Local Broadcasting Schedules and CONGEST Algorithms in the SINR Model.- The Effect of Forgetting on the Performance of a Synchronizer.- On the Complexity of Barrier Resilience for Fat Regions.- A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks.- Uniform Dispersal of Asynchronous Finite-State Mobile Robots in Presence of Holes.- On the Complexity of Fixed-Schedule Neighbourhood Learning in Wireless Ad Hoc Radio Networks.- Optimal Nearest Neighbor Queries in Sensor Networks.- Conflict Graphs and the Capacity of the Mean Power Scheme.- Rendezvous of Two Robots with Visible Bits.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)
- Amsterdam ; Washington D.C. : IOS Press, ©2008.
- Description
- Book — 1 online resource (ix, 355 pages) : illustrations Digital: data file.
- Summary
-
- Preface -- Section I: Network security: Network security and survivability: using wireless overlay networks for critical infrastructure protection / M. Bermester
- Security when routers are taken over by the adversary / Y. Desmedt
- Security in quantum cryptography and quantum networks / J. Gruska
- The case for self-healing software / A.D. Keromytis
- Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" / I. Kotenko
- Formal treatment of secure protocols: an introduction / D. Krizanc, J. Lipton
- Behavioral and structural properties of malicious code / C. Kruegel
- Security from the practitioner's point of view / M. Oit
- Mobile and wireless communications security / B. Preneel
- Humanitarian problems in information security / V. Tairyan [and others]
- Multimedia security: open problems and solutions / S. Voloshynovskiy [and others]
- A selective introduction to border gateway protocol (BGP) security issues / T. Wan, P.C. van Oorschot, E. Kranakis
- Section II: Information security: Steganography & steganalysis an overview of research & challenges / S.S. Agaian
- Guessing and cryptography / E. Arikan
- The exact approximate encryption of quantum information / J. Bouda
- A new approach to stochastic quantum processes, their manipulation and control / A. Gevorkyan
- Reliability approach in Wiretapper guessing theory / E.A. Haroutunian
- E-capacity of information hiding systems / M.E. Haroutunian
- Quasicrystals in cryptography / J. Patera, M. Nesterenko
- Asymptotic investigation of mutual information and capacity of certain communication channels / V. Prelov
- Information theory of covert timing channels / A.B Wagner, V. Anantharam
- Section III: Coding: A survey of new results in coding with feedback and searching with lies / C. Deppe
- Remarks on e-optimal rate function in DMS coding / A. Harutyunyan
- Reconstruction of data distorted by some errors / E. Konstantinova
- On (w, r) cover-free codes / V. Lebedev
- Switching methods for error-correcting codes / F. Solovéva
- On reconstruction of functions on the hypercube / A. Vasiléva.
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.