|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-22971-3 |
003 |
DE-He213 |
005 |
20220113040221.0 |
007 |
cr nn 008mamaa |
008 |
100301s2005 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387229713
|9 978-0-387-22971-3
|
024 |
7 |
|
|a 10.1007/b100182
|2 doi
|
050 |
|
4 |
|a QA76.9.D35
|
050 |
|
4 |
|a Q350-390
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a GPF
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
072 |
|
7 |
|a UMB
|2 thema
|
072 |
|
7 |
|a GPF
|2 thema
|
082 |
0 |
4 |
|a 005.73
|2 23
|
082 |
0 |
4 |
|a 003.54
|2 23
|
100 |
1 |
|
|a Zou, Xukai.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Secure Group Communications Over Data Networks
|h [electronic resource] /
|c by Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras.
|
250 |
|
|
|a 1st ed. 2005.
|
264 |
|
1 |
|a New York, NY :
|b Springer New York :
|b Imprint: Springer,
|c 2005.
|
300 |
|
|
|a XIX, 172 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Typical Group Key Management Schemes -- Tree Based Key Management Schemes -- Dynamic Conferencing Schemes -- Secure Group Communications with Hierarchical Access Control -- SGC Challenges and SGC for Wireless Networks -- Concluding Remarks.
|
520 |
|
|
|a This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over data networks. It offers an overview of secure algorithms and protocols for group communication linking areas such as applied cryptography and computer networking. Also included is a coverage of challenges in deploying secure group communication-based applications over wireless networks. These challenges include the limited computational power of mobile devices, susceptibility of wireless networks to intrusion and unauthorized access and mobility of nodes in a wireless ad-hoc network environment. Secure Group Communications over Data Networks provides a wealth of information for network architects, IT Professionals, computer scientists, and advanced students of computer science and computer engineering in the fields of networking, computer security and software applications development.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
1 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
700 |
1 |
|
|a Ramamurthy, Byrav.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Magliveras, Spyros S.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441919939
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387502151
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387229706
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/b100182
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|