Limitar la búsqueda a ejemplares disponibles

Cubierta del libro
Autor Xiao, Sheng. author.

Título Dynamic Secrets in Communication Security [electronic resource] / by Sheng Xiao, Weibo Gong, Don Towsley.

Descripción física XI, 136 p. online resource.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Colección Springer eBooks. Computer Science
       Mostrar referencias similares
Contiene: Introduction -- Communication Security and Key Safety -- Dynamic Secrets -- Dynamic Wireless Security -- Dynamic Key Management in a Smart Grid -- Secrecy in Communications -- Reliability Analysis for Communication Security -- Future Applications.
Resumen: Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a useŕ鳠password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.
Materia Computer science.
Computer communication systems.
Computer security.
Data structures (Computer science).
Data encryption (Computer science).
Electrical engineering.
Computer Science.
       Mostrar referencias similares
Systems and Data Security.
       Mostrar referencias similares
Computer Communication Networks.
       Mostrar referencias similares
Data Encryption.
       Mostrar referencias similares
Data Structures, Cryptology and Information Theory.
       Mostrar referencias similares
Communications Engineering, Networks.
       Mostrar referencias similares
Autor secundario Gong, Weibo., author.
Towsley, Don., author.
SpringerLink (Online service)
En Springer eBooks
OTRO SOPORTE Printed edition: 9781461478300
ISBN 9781461478317 978-1-4614-7831-7
ISBN/ISSN 10.1007/978-1-4614-7831-7 doi