Cargando…

Dynamic Secrets in Communication Security

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrup...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Xiao, Sheng (Autor), Gong, Weibo (Autor), Towsley, Don (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer New York : Imprint: Springer, 2014.
Edición:1st ed. 2014.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4614-7831-7
003 DE-He213
005 20220114204300.0
007 cr nn 008mamaa
008 130806s2014 xxu| s |||| 0|eng d
020 |a 9781461478317  |9 978-1-4614-7831-7 
024 7 |a 10.1007/978-1-4614-7831-7  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Xiao, Sheng.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Dynamic Secrets in Communication Security  |h [electronic resource] /  |c by Sheng Xiao, Weibo Gong, Don Towsley. 
250 |a 1st ed. 2014. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2014. 
300 |a XI, 136 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Introduction -- Communication Security and Key Safety -- Dynamic Secrets -- Dynamic Wireless Security -- Dynamic Key Management in a Smart Grid -- Secrecy in Communications -- Reliability Analysis for Communication Security -- Future Applications. 
520 |a Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering. 
650 0 |a Data protection. 
650 0 |a Computer networks . 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Telecommunication. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Cryptology. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Communications Engineering, Networks. 
700 1 |a Gong, Weibo.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Towsley, Don.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781493902293 
776 0 8 |i Printed edition:  |z 9781461478324 
776 0 8 |i Printed edition:  |z 9781461478300 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4614-7831-7  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)