Message from the General Chairs | p. vii |
MWNS 2008 Committees | p. ix |
Toward a New Ad hoc Node Design for Secure Service Deployment over Ad hoc Network | p. 1 |
TCA: Topology Change Attack in Peer-to-Peer Networks | p. 13 |
Device Pairing using Unidirectional Physical Channels | p. 27 |
An Industrial and Academic Joint Experiment on Automated Verification of a Security Protocol | p. 39 |
A Performance-Based Approach to Selecting a Secure Service Discovery Architecture | p. 55 |
A Solution for Defending against Denial of Service Attack on Wireless LAN | p. 67 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.