50
Used, New, and Out of Print Books - We Buy and Sell - Powell's Books
Cart |
|  my account  |  wish list  |  help   |  800-878-7323
Hello, | Login
MENU
  • Browse
    • New Arrivals
    • Bestsellers
    • Featured Preorders
    • Award Winners
    • Audio Books
    • See All Subjects
  • Used
  • Staff Picks
    • Staff Picks
    • Picks of the Month
    • Bookseller Displays
    • 50 Books for 50 Years
    • 25 Best 21st Century Sci-Fi & Fantasy
    • 25 PNW Books to Read Before You Die
    • 25 Books From the 21st Century
    • 25 Memoirs to Read Before You Die
    • 25 Global Books to Read Before You Die
    • 25 Women to Read Before You Die
    • 25 Books to Read Before You Die
  • Gifts
    • Gift Cards & eGift Cards
    • Powell's Souvenirs
    • Journals and Notebooks
    • socks
    • Games
  • Sell Books
  • Blog
  • Events
  • Find A Store

Don't Miss

  • Proud Voices Sale
  • PNW Authors Sale
  • Powell's Author Events
  • Oregon Battle of the Books
  • Audio Books

Visit Our Stores


Helen Schulman: Powell's Q&A: Helen Schulman, author of 'Lucky Dogs' (0 comment)
Describe your latest book. I felt like I was on fire the whole time I was writing Lucky Dogs, even when I was downed by long-haul Covid. The book was fueled by all the breaking articles about high-powered men using their considerable resources to get away with sexual abuse on a massive scale...
Read More»
  • Claire Fuller: Books for a Writing Reset: Claire Fuller’s Bookshelf for ‘The Memory of Animals’ (0 comment)
  • Powell's Staff: Books to Fill the TV-Shaped Hole in Your Heart (1 comment)

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##

Security Protocols for Mobile Ad Hoc Networks

by Carlton Davis
Security Protocols for Mobile Ad Hoc Networks

  • Comment on this title
  • Synopses & Reviews

ISBN13: 9783639002317
ISBN10: 3639002318
Condition: Standard


All Product Details

View Larger ImageView Larger Images
Ships free on qualified orders.
Add to Cart
0.00
List Price:0.00
Trade Paperback
Ships in 1 to 3 days
Add to Wishlist

Synopses & Reviews

Synopsis

This book contains research conducted over a three year period, for a Ph.D. Thesis. It provides the following: An introduction to mobile ad hoc networks (MANETs); an in-dept analysis of the state of art of MANET security and MANET routing security; in-dept analysis of IEEE 802.11 Wired Equivalent Privacy (WEP), IEEE 802.11i Temporal Key Integrity Protocol (TKIP) and Counter Mode CBC-MAC Protocol (CCMP); valuable insights into the process of developing MANET security protocols; detail and analysis of a localized MANET certificate revocation protocol the author developed; detail and analysis of a robust secure MANET routing protocol the author developed.

What Our Readers Are Saying

Be the first to share your thoughts on this title!




Product Details

ISBN:
9783639002317
Binding:
Trade Paperback
Publication date:
05/01/2008
Publisher:
VDM VERLAG DR MULLER
Pages:
124
Height:
.26IN
Width:
6.00IN
Thickness:
.26 in.
Number of Units:
1
Copyright Year:
2008
UPC Code:
4294967295
Author:
Carlton Davis
Media Run Time:
B

Ships free on qualified orders.
Add to Cart
0.00
List Price:0.00
Trade Paperback
Ships in 1 to 3 days
Add to Wishlist
Used Book Alert for book Receive an email when this ISBN is available used.
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
  • Twitter
  • Facebook
  • Pinterest
  • Instagram

  • Help
  • Guarantee
  • My Account
  • Careers
  • About Us
  • Security
  • Wish List
  • Partners
  • Contact Us
  • Shipping
  • Transparency ACT MRF
  • Sitemap
  • © 2023 POWELLS.COM Terms

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##