<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>     cam a22     7  4500</leader>
  <controlfield tag="001">317161075</controlfield>
  <controlfield tag="003">CHVBK</controlfield>
  <controlfield tag="005">20201009192934.0</controlfield>
  <controlfield tag="006">m        d        </controlfield>
  <controlfield tag="007">cr |n ||||||||</controlfield>
  <controlfield tag="008">140625t20142014sz a    sb    000 0 eng d</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
   <subfield code="a">  2014930297</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">3-319-04602-0 (pbk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">978-3-319-04602-0 (pbk.)</subfield>
  </datafield>
  <datafield tag="024" ind1="7" ind2=" ">
   <subfield code="a">10.1007/978-3-319-04603-7</subfield>
   <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(SERSOL)ssj0001167866</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(IDSSG)000655430</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(WaSeSS)ssj0001167866</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">CDX</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">CDX</subfield>
   <subfield code="d">BTCTA</subfield>
   <subfield code="d">YDXCP</subfield>
   <subfield code="d">DEBSZ</subfield>
   <subfield code="d">SUC</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">OCLCF</subfield>
   <subfield code="d">DLC</subfield>
   <subfield code="d">WaSeSS</subfield>
   <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="050" ind1="0" ind2="0">
   <subfield code="a">TK5105.77</subfield>
   <subfield code="b">.M34 2014</subfield>
  </datafield>
  <datafield tag="050" ind1=" " ind2=" ">
   <subfield code="a">TK5105.5-5105.9</subfield>
  </datafield>
  <datafield tag="072" ind1=" " ind2="7">
   <subfield code="a">COM075000</subfield>
   <subfield code="2">bisacsh</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2=" ">
   <subfield code="a">004.6</subfield>
   <subfield code="2">23</subfield>
  </datafield>
  <datafield tag="091" ind1=" " ind2=" ">
   <subfield code="a">CH001293E94F72F18302DC1257F0700701E79</subfield>
   <subfield code="b">iCapture</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Mahmoud</subfield>
   <subfield code="D">Mohamed M. E. A.</subfield>
   <subfield code="e">author</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Security for multi-hop wireless networks</subfield>
   <subfield code="c">Mohamed M.E.A. Mahmoud, Xuemin (Sherman) Shen</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Cham</subfield>
   <subfield code="b">Springer</subfield>
   <subfield code="c">[2014]</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="4">
   <subfield code="c">©2014</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xiii, 99 pages)</subfield>
   <subfield code="b">illustrations</subfield>
  </datafield>
  <datafield tag="490" ind1="0" ind2=" ">
   <subfield code="a">SpringerBriefs in computer science</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references.</subfield>
  </datafield>
  <datafield tag="506" ind1=" " ind2=" ">
   <subfield code="a">Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access.</subfield>
  </datafield>
  <datafield tag="520" ind1="3" ind2=" ">
   <subfield code="a">This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Wireless communication systems</subfield>
   <subfield code="x">Security measures</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="7">
   <subfield code="a">Wireless communication systems</subfield>
   <subfield code="x">Security measures</subfield>
   <subfield code="0">(OCoLC)fst01176222</subfield>
   <subfield code="2">fast</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer science</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer Communication Networks</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Telecommunication</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Shen</subfield>
   <subfield code="D">X.</subfield>
   <subfield code="q">Xuemin</subfield>
   <subfield code="d">1958-</subfield>
   <subfield code="e">author</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">https://link.springer.com/10.1007/978-3-319-04603-7</subfield>
   <subfield code="z">Uni Basel: Volltext</subfield>
  </datafield>
  <datafield tag="898" ind1=" " ind2=" ">
   <subfield code="a">BK020053</subfield>
   <subfield code="b">XK020053</subfield>
   <subfield code="c">XK020000</subfield>
  </datafield>
  <datafield tag="909" ind1=" " ind2="4">
   <subfield code="f">Springer Computer Science eBooks 2014 English/International</subfield>
  </datafield>
  <datafield tag="909" ind1=" " ind2="4">
   <subfield code="a">E-Books von 360MarcUpdates</subfield>
  </datafield>
  <datafield tag="909" ind1=" " ind2="7">
   <subfield code="a">noalma</subfield>
   <subfield code="2">ids I</subfield>
  </datafield>
  <datafield tag="949" ind1=" " ind2=" ">
   <subfield code="B">IDSSG</subfield>
   <subfield code="F">HSG</subfield>
   <subfield code="b">HSG</subfield>
   <subfield code="c">ONL</subfield>
   <subfield code="j">HONL000655430</subfield>
  </datafield>
  <datafield tag="949" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="F">A145</subfield>
   <subfield code="b">A145</subfield>
   <subfield code="c">145VT</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">100</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Mahmoud</subfield>
   <subfield code="D">Mohamed M. E. A.</subfield>
   <subfield code="e">author</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">490</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">SpringerBriefs in computer science</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Shen</subfield>
   <subfield code="D">X.</subfield>
   <subfield code="q">Xuemin</subfield>
   <subfield code="d">1958-</subfield>
   <subfield code="e">author</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">856</subfield>
   <subfield code="E">40</subfield>
   <subfield code="u">https://link.springer.com/10.1007/978-3-319-04603-7</subfield>
   <subfield code="z">Uni Basel: Volltext</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSSG</subfield>
   <subfield code="P">490</subfield>
   <subfield code="E">0-</subfield>
   <subfield code="a">SpringerBriefs in Computer Science</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSSG</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Mahmoud</subfield>
   <subfield code="D">Mohamed M. E. A.</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSSG</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Shen</subfield>
   <subfield code="D">Xuemin</subfield>
   <subfield code="q">Sherman</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSSG</subfield>
   <subfield code="P">856</subfield>
   <subfield code="E">4-</subfield>
   <subfield code="u">https://doi.org/10.1007/978-3-319-04603-7</subfield>
   <subfield code="z">Full text for the University of St. Gallen</subfield>
  </datafield>
  <datafield tag="986" ind1=" " ind2=" ">
   <subfield code="a">SWISSBIB</subfield>
   <subfield code="b">317161075</subfield>
  </datafield>
 </record>
</collection>
