Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.
This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.
This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
List of Figures. List of Tables. Preface. 1: Introduction. 1.1. Challenges of Broadcast Communication. 1.2. Why is Security for Broadcasts Hard? 1.3.Security Requirements for Broadcast Applications. 1.4. Novel Contributions. 1.5. Scope of This Book. 1.6. Book Overview. 2: Cryptographic Fundamentals. 2.1. Broadcast Network Requirements. 2.2. Cryptographic Primitives. 2.3. Efficiency in Cryptographic Primitives. 2.4. Commitment Protocols. 3: TESLA Broadcast Authentication. 3.1. Requirements for Broadcast Authentication. 3.2. The Basic TESLA Protocol. 3.3. TIK: TESLA With Instant Key Disclosure. 3.4. Time Synchronization. 3.5. Variations. 3.6. Denial-of-Service Protection. 4: BiBa Broadcast Authentication. 4.1. The BiBa Signature Algorithm. 4.2. The BiBa Broadcast Authentication Protocol. 4.3. BiBa Broadcast Protocol Extensions. 4.4. Practical Considerations. 4.5. Variations and Extensions. 4.6. One-Round BiBa is as Secure as Multi-Round BiBa. 4.7. Merkle Hash Trees for Ball Authentication. 5: EMSS, MESS, and HTSS: Signatures for Broadcast. 5.1. Efficient Multicast Stream Signature (EMSS). 5.2. MESS. Variations. 5.4. HTSS. 6: ELK Key Distribution. 6.1. Introduction. 6.2. Review of the LKH Key Distribution Protocol. Review of the OFT Key Distribution Protocol. 6.4Reliability for Key Update Messages. 6.5. Four Basic Techniques. 6.6. ELK: Efficient Large-Group Key Distribution. 6.7. Applications and Practical Issues. 6.8. Appendix. 7: Sensor Network Security. 7.1. Background. 7.2. System Assumptions. 7.3. Requirements for Sensor Network Security. 7.4. Additional Notation. 7.5. SNEP and &mgr;TESLA. 7.6. Implementation. 7.7. Evaluation. 7.8. Application of SNEP: Node-to-Node Key Agreement. 8: Related Work. 8.1. General Broadcast Security. 8.2.Broadcast Authentication. 8.3. Broadcast Signature. 8.4. Digital Signatures Based on One-way Functions without Trapdoors. 8.5. Small-Group Key Arrangement. 8.6. Large-Group Key Distribution. 9: Conclusion. 9.1. Open Problems. 10: Glossary. References. Index.
Book by Perrig Adrian Tygar JD
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: Brook Bookstore On Demand, Napoli, NA, Italia
Condizione: new. Questo è un articolo print on demand. Codice articolo 3a2e3de752781758610a46c62d3864d8
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9781461349761_new
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: \*key distribution for access control, \*source authentication of transmissions, and \*non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study. 240 pp. Englisch. Codice articolo 9781461349761
Quantità: 2 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. aSecure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and w. Codice articolo 4193218
Quantità: Più di 20 disponibili
Da: preigu, Osnabrück, Germania
Taschenbuch. Condizione: Neu. Secure Broadcast Communication | In Wired and Wireless Networks | J. D. Tygar (u. a.) | Taschenbuch | xix | Englisch | 2012 | Springer US | EAN 9781461349761 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu. Codice articolo 105998313
Quantità: 5 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:\*key distribution for access control\*source authentication of transmissions, and\*non-repudiation of streams.This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 240 pp. Englisch. Codice articolo 9781461349761
Quantità: 1 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: \*key distribution for access control, \*source authentication of transmissions, and \*non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study. Codice articolo 9781461349761
Quantità: 1 disponibili
Da: Mispah books, Redhill, SURRE, Regno Unito
Paperback. Condizione: Like New. Like New. book. Codice articolo ERICA78714613497616
Quantità: 1 disponibili