|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Yang Xiao (The University of Alabama, Tuscaloosa, USA) , Yang Xiao (The University of Alabama, Tuscaloosa, USA) , Vojislav B. Mišic (University of Manitoba, Winnipeg, Canada) , Krishna M. Sivalingam (University of Maryland, Baltimore, USA University of Maryland, Baltimore, USA)Publisher: Taylor & Francis Ltd Imprint: Auerbach Dimensions: Width: 15.60cm , Height: 2.40cm , Length: 23.40cm Weight: 0.635kg ISBN: 9780849370588ISBN 10: 0849370582 Pages: 358 Publication Date: 15 August 2006 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsAttacks. Encryption, authentication, and watermarking. Key managements. Secure routing. Secure aggregation, location, and cross-layer.ReviewsAuthor InformationYang Xiao Tab Content 6Author Website:Countries AvailableAll regions |