Secure Broadcast Communication: In Wired and Wireless NetworksSpringer Science & Business Media, 2003 - 214 lappuses Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study. |
No grāmatas satura
1.–5. rezultāts no 79.
... Protocol Sketch of protocol Sender Setup 29 29 30 30 31 Bootstrapping Receivers 32 Authentication at Receiver 3.2.4 Broadcasting Authenticated Messages 3.2.5 3.2.6 TESLA Summary and Security Considerations 3.3 TIK : TESLA with Instant ...
... Protocol 65 4.2.1 One - way Ball Chains 65 4.3.1 4.3.2 4.2.2 Security Condition 4.3 BiBa Broadcast Protocol Extensions Extension A 67 67 68 Extension B 69 4.4 Practical Considerations 69 4.4.1 Selection of BiBa Parameters 70 4.4.2 BiBa ...
... Protocol 123 6.5.2 The Time - Structured Tree ( TST ) Protocol 6.5.3 Entropy Injection Key Update ( EIKU ) 6.5.4 Very - Important Bits ( VIB ) 125 125 128 6.6 ELK : Efficient Large - Group Key Distribution 130 6.7 Applications and ...
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
IV | 1 |
V | 3 |
VI | 5 |
VIII | 8 |
IX | 9 |
XI | 10 |
XII | 12 |
XIII | 13 |
LXXVI | 85 |
LXXVII | 87 |
LXXVIII | 92 |
LXXX | 94 |
LXXXI | 98 |
LXXXII | 104 |
LXXXIII | 106 |
LXXXIV | 110 |
XV | 19 |
XVI | 20 |
XIX | 22 |
XXII | 23 |
XXIII | 24 |
XXIV | 25 |
XXVI | 26 |
XXVII | 29 |
XXVIII | 30 |
XXIX | 31 |
XXX | 32 |
XXXI | 33 |
XXXIII | 34 |
XXXIV | 35 |
XXXV | 39 |
XXXVI | 40 |
XXXVIII | 43 |
XXXIX | 44 |
XLI | 45 |
XLIII | 46 |
XLIV | 48 |
XLV | 49 |
XLVI | 50 |
XLVII | 51 |
XLVIII | 52 |
XLIX | 55 |
L | 56 |
LI | 57 |
LIII | 58 |
LV | 59 |
LVII | 61 |
LVIII | 62 |
LIX | 65 |
LXI | 67 |
LXIII | 68 |
LXIV | 69 |
LXVI | 70 |
LXIX | 73 |
LXX | 74 |
LXXIII | 75 |
LXXIV | 78 |
LXXV | 81 |
LXXXV | 111 |
LXXXVI | 112 |
LXXXVII | 113 |
LXXXVIII | 116 |
LXXXIX | 118 |
XC | 119 |
XCII | 121 |
XCIII | 123 |
XCV | 125 |
XCVII | 128 |
XCVIII | 130 |
XCIX | 133 |
CI | 134 |
CIII | 135 |
CIV | 136 |
CV | 137 |
CVI | 138 |
CIX | 140 |
CX | 149 |
CXI | 151 |
CXIII | 152 |
CXIV | 153 |
CXVI | 154 |
CXVII | 155 |
CXXI | 156 |
CXXIII | 157 |
CXXV | 161 |
CXXVI | 165 |
CXXVII | 168 |
CXXVIII | 172 |
CXXIX | 175 |
CXXXI | 176 |
CXXXII | 178 |
CXXXIII | 179 |
CXXXIV | 180 |
CXXXV | 181 |
CXXXVI | 185 |
CXXXVII | 186 |
CXXXVIII | 189 |
193 | |
213 | |
Citi izdevumi - Skatīt visu
Secure Broadcast Communication: In Wired and Wireless Networks Adrian Perrig,J.D. Tygar Ierobežota priekšskatīšana - 2012 |
Secure Broadcast Communication: In Wired and Wireless Networks Adrian Perrig,J.D. Tygar Priekšskatījums nav pieejams - 2012 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Security in Distributed, Grid, Mobile, and Pervasive Computing Yang Xiao Ierobežota priekšskatīšana - 2007 |