Security in distributed and networking systems /
Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Singapore ; Hackensack, NJ :
World Scientific,
©2007.
|
Colección: | Computer and network security ;
v. 1. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti
- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo
- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler
- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing
- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo
- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni
- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang
- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic
- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland
- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar
- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok
- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris
- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong
- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen
- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang
- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu
- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C.M. Leung
- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu.