|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-68848-0 |
003 |
DE-He213 |
005 |
20220116170630.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387688480
|9 978-0-387-68848-0
|
024 |
7 |
|
|a 10.1007/978-0-387-68848-0
|2 doi
|
050 |
|
4 |
|a TK5101-5105.9
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
072 |
|
7 |
|a TJK
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Sun, Yan.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Network-Aware Security for Group Communications
|h [electronic resource] /
|c by Yan Sun, Wade Trappe, K. J. Ray Liu.
|
250 |
|
|
|a 1st ed. 2008.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2008.
|
300 |
|
|
|a XVIII, 304 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Centralized Multi-user Key Management -- Group Key Agreement Techniques in Heterogeneous Networks -- Optimizing Rekeying Costs in Group Key Agreement -- Optimizing Multicast Key Management for Cellular Multicasting -- Key Management and Distribution for Securing Multimedia Multicasts -- Hierarchical Access Control for Multi-Group Scenarios -- Protecting Membership Information in Secure Multicasting -- Reducing Delay and Enhancing DoS Resistance in Multicast Authentication -- An Authentication Service for Sensor and Ad Hoc Networks.
|
520 |
|
|
|a Network-Aware Security for Group Communications fills a growing need in the research community for a reference that describes the state-of-the-art in securing group communications in emerging networks and for future applications. The growth of multi-user services makes it essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group communications. This book is focused on tailoring security solutions to the underlying network architecture (such as the wireless cellular network, or ad hoc and sensor networks), or to targeted applications using methods tailored for that application (such as multimedia multicasts). The authors focus the discussion on two fundamental security issues for group communications: providing efficient key management for providing confidentiality, and providing authentication for group services.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Signal processing.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computer engineering.
|
650 |
1 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Signal, Speech and Image Processing .
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
700 |
1 |
|
|a Trappe, Wade.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Liu, K. J. Ray.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387517476
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441943354
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387688466
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-0-387-68848-0
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|