| Tag |
First Indicator |
Second Indicator |
Subfields |
| LEADER |
00000nam a22000007i 4500 |
| 001 |
in00005690607 |
| 005 |
20260215001248.8 |
| 006 |
m o d |
| 007 |
cr cnu---unuuu |
| 008 |
251115t20262026nju o 000 0 eng d |
| 035 |
|
|
|a wil6005422
|
| 035 |
|
|
|a (NhCcYBP)wil6005422
|
| 040 |
|
|
|a NhCcYBP
|b eng
|e rda
|c NhCcYBP
|
| 020 |
|
|
|a 9781394311057
|q electronic book
|
| 020 |
|
|
|a 1394311052
|q electronic book
|
| 020 |
|
|
|a 9781394311033
|q electronic book
|
| 020 |
|
|
|a 1394311036
|q electronic book
|
| 020 |
|
|
|z 9781394311002
|q hardcover
|
| 020 |
|
|
|z 1394311001
|q hardcover
|
| 024 |
7 |
|
|a 10.1002/9781394311057
|2 doi
|
| 037 |
|
|
|a 9781394311002
|b O'Reilly Media
|
| 050 |
|
4 |
|a TK5103.252
|b .S43 2026
|
| 082 |
0 |
4 |
|a 621.3845/6
|2 23/eng/20251203
|
| 245 |
0 |
0 |
|a Security and privacy in 6G communication technology /
|c edited by Parita Jain... [and 4 others].
|
| 264 |
|
1 |
|a Hoboken, NJ :
|b John Wiley & Sons, Inc. ;
|a Beverly, MA :
|b Scriverner Publishing LLC,
|c 2026.
|
| 264 |
|
4 |
|c ©2026
|
| 300 |
|
|
|a 1 online resource (376 p.)
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/c
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/cr
|
| 505 |
0 |
|
|a Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 A Comprehensive Study of Security and Privacy Issues of 6G Wireless Communications Networks -- 1.1 Introduction -- 1.1.1 History of Wireless Communication -- 1.1.2 Overview of 6G Networks -- 1.1.2.1 Advancement in 6G Technology -- 1.1.2.2 Importance of Developing 6G Technology -- 1.1.3 Features of 6G Networks -- 1.1.4 Applications of 6G Networks -- 1.1.5 Disadvantages of 6G Networks -- 1.1.6 Challenges of 6G Networks -- 1.2 Security Evolution of Communication Networks
|
| 505 |
8 |
|
|a 1.3 Privacy and Security Issues with 6G Networks -- 1.3.1 Privacy Challenges in 6G Networks -- 1.3.2 Security Challenges in 6G Networks -- 1.4 Proposed Security Solution for 6G Networks -- 1.4.1 Distributed and Scalable AI/ML Security -- 1.4.2 Distributed Ledger Technology (DLT) -- 1.4.3 Quantum Security -- 1.4.4 Physical Layer Security (PLS) -- 1.5 Conclusion -- References -- Chapter 2 Key Security Issues and Solutions in 6G Communications -- 2.1 Introduction -- 2.1.1 Security Considerations for 6G Communication -- 2.1.2 Survey Objectives -- 2.1.3 Overview of 6G Communication Paradigm
|
| 505 |
8 |
|
|a 2.1.3.1 Evolution from 5G to 6G -- 2.1.3.2 Key Features of 6G Networks -- 2.1.4 Emerging Technologies in 6G -- 2.2 Security Challenges for 6G Communications -- 2.2.1 Security Implications -- 2.2.2 AI and Machine Learning Integration: Security Concerns -- 2.2.3 Network Slicing: Isolation and Security Issues -- 2.2.4 Security Implications with Ultra-Low Latency -- 2.2.5 Terahertz Communications -- 2.2.6 Unique Security Concerns -- 2.2.7 Integration of Internet of Things and Edge Devices -- 2.2.8 Expanded Attack Surface and Privacy Concerns -- 2.2.9 User Data and Anonymity
|
| 505 |
8 |
|
|a 2.2.10 Quantum Computing Threats -- 2.3 Legacy Security Concepts in 6G -- 2.3.1 Confidentiality, Integrity, and Availability -- 2.3.2 Authentication -- 2.3.3 Access Control -- 2.4 6G Security Innovations -- 2.4.1 AI Integration -- 2.4.2 Quantum Computing Impact -- 2.4.3 Federated Learning Role -- 2.5 Threat Models in 6G Communication -- 2.5.1 Threat-Countering Techniques in 6G Communication -- 2.5.1.1 Cryptographic Methods -- 2.5.1.2 Quantum-Resistant Cryptography -- 2.5.1.3 Homomorphic Encryption -- 2.5.1.4 Entity Attributes -- 2.5.1.5 Biometric Authentication -- 2.5.1.6 Device Fingerprinting
|
| 505 |
8 |
|
|a 2.5.1.7 Intrusion Detection Systems (IDSs) -- 2.6 Authentication Techniques in 6G Communication -- 2.6.1 Handover Authentication -- 2.6.2 Mutual Authentication -- 2.6.3 Physical Layer -- 2.6.4 Deniable Authentication -- 2.6.5 Token-Based Authentication -- 2.6.6 Authentication Using Certificates -- 2.6.7 Key Agreement-Based Validation -- 2.6.8 Multi-Factor Authentication -- 2.7 Future Directions -- 2.7.1 Improving AI Security in 6G and Developing Quantum-Safe Protocols -- 2.7.2 Advancing Federated Learning for Privacy-Preserving Security -- 2.8 Conclusion -- References
|
| 500 |
|
|
|a Chapter 3 Strategies for Ensuring Security and Privacy in 6G Networks
|
| 520 |
|
|
|a Future-proof your knowledge and expertise in telecommunications with this essential guide, which provides a comprehensive analysis of the critical security and privacy challenges in the transition to 6G communication.
|
| 532 |
1 |
|
|3 Wiley
|a "We measure accessibility according to the standards set by the Web Content Accessibility Guidelines (WCAG) 2.2 A/AA, Revised Section 508 of the US Rehabilitation Act, and EN 301 549." Source: https://onlinelibrary.wiley.com/accessibility. Last accessed April 22, 2025
|
| 588 |
|
|
|a Description based on online resource; title from digital title page (viewed on December 03, 2025).
|
| 650 |
|
0 |
|a Wireless communication systems
|x Security measures.
|
| 655 |
|
0 |
|a Electronic books.
|
| 700 |
1 |
|
|a Jain, Parita,
|e editor.
|
| 700 |
1 |
|
|a Aggarwal, Puneet Kumar.
|
| 700 |
1 |
|
|a Singh, Mandeep.
|
| 700 |
1 |
|
|a Singh, Sushil Kumar.
|
| 700 |
1 |
|
|a Singhal, Amit.
|
| 776 |
0 |
8 |
|i Print version:
|a Jain, Parita
|t Security and Privacy in 6G Communication Technology
|d Newark : John Wiley & Sons, Incorporated,c2026
|z 9781394311002
|
| 776 |
0 |
8 |
|i Print version:
|z 1394311001
|z 9781394311002
|
| 856 |
4 |
0 |
|u http://proxy.library.tamu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9781394311057
|z Connect to the full text of this electronic book
|t 0
|
| 955 |
|
|
|a Wiley EBA record
|
| 975 |
|
|
|p Wiley UBCM Full Collection
|
| 976 |
|
|
|a 6005422
|
| 999 |
f |
f |
|i 7e86dba1-e2d3-458c-b157-8105b49a7a4c
|s 79fcea5d-fe18-4ebd-9975-1b5188c7becd
|t 0
|
| 952 |
f |
f |
|a Texas A&M University
|b College Station
|c Electronic Resources
|s evans_pda
|d Available Online
|t 0
|e TK5103.252 .S43 2026
|h Library of Congress classification
|
| 998 |
f |
f |
|a TK5103.252 .S43 2026
|t 0
|l Available Online
|