Security for Multihop Wireless Networks provides broad coverage of the security issues facing mul...
Although the information and communication technology (ICT) industry accounted for only 2 percent...
Guiding readers through the basics of these rapidly emerging networks to more advanced concepts a...
A cognitive network makes use of the information gathered from the network in order to sense the ...
By 2020, if not before, mobile computing and wireless systems are expected to enter the fifth gen...
By 2020, if not before, mobile computing and wireless systems are expected to enter the fifth gen...
This book constitutes the refereed proceedings of the International Symposium on Security in Comp...
This volume is the second part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), whi...
This volume is the first part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), whic...
This book constitutes the refereed proceedings of the 13th International Conference on Ad-hoc, Mo...
This volume is the fourth part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), whi...
This book constitutes the refereed proceedings of six workshops collocated with the 13th Internat...