Dynamic Secrets in Communication Security (Hardcover)
Sheng Xiao
Venduto da Grand Eagle Retail, Bensenville, IL, U.S.A.
Venditore AbeBooks dal 12 ottobre 2005
Nuovi - Rilegato
Condizione: Nuovo
Quantità: 1 disponibili
Aggiungere al carrelloVenduto da Grand Eagle Retail, Bensenville, IL, U.S.A.
Venditore AbeBooks dal 12 ottobre 2005
Condizione: Nuovo
Quantità: 1 disponibili
Aggiungere al carrelloHardcover. Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication."Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a users password or their key is lost.Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering. Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Codice articolo 9781461478300
From the reviews:
“It is based on the doctoral dissertation ... completed by Sheng Xiao of the University of Massachusetts, Amherst, in the year 2013, under the guidance of Weibo Gong and Don Towsley. The work is intended for sophisticated students of computer science as well as electrical engineering. It is also meant for research workers and practitioners involved in network security and/or wireless communications. ... The topics in the book are interesting. ... I recommend the book for security enthusiasts.” (S. V. Nagaraj, Computing Reviews, April, 2014)
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Visita la pagina della libreria
We guarantee the condition of every book as it¿s described on the Abebooks web sites. If you¿ve changed
your mind about a book that you¿ve ordered, please use the Ask bookseller a question link to contact us
and we¿ll respond within 2 business days.
Books ship from California and Michigan.
Orders usually ship within 2 business days. All books within the US ship free of charge. Delivery is 4-14 business days anywhere in the United States.
Books ship from California and Michigan.
If your book order is heavy or oversized, we may contact you to let you know extra shipping is required.
Quantità dell?ordine | Da 6 a 16 giorni lavorativi | Da 6 a 14 giorni lavorativi |
---|---|---|
Primo articolo | EUR 0.00 | EUR 0.00 |
I tempi di consegna sono stabiliti dai venditori e variano in base al corriere e al paese. Gli ordini che devono attraversare una dogana possono subire ritardi e spetta agli acquirenti pagare eventuali tariffe o dazi associati. I venditori possono contattarti in merito ad addebiti aggiuntivi dovuti a eventuali maggiorazioni dei costi di spedizione dei tuoi articoli.