000 | 03107nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-1-4614-7831-7 | ||
003 | DE-He213 | ||
005 | 20200421111657.0 | ||
007 | cr nn 008mamaa | ||
008 | 130806s2014 xxu| s |||| 0|eng d | ||
020 |
_a9781461478317 _9978-1-4614-7831-7 |
||
024 | 7 |
_a10.1007/978-1-4614-7831-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aXiao, Sheng. _eauthor. |
|
245 | 1 | 0 |
_aDynamic Secrets in Communication Security _h[electronic resource] / _cby Sheng Xiao, Weibo Gong, Don Towsley. |
264 | 1 |
_aNew York, NY : _bSpringer New York : _bImprint: Springer, _c2014. |
|
300 |
_aXI, 136 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Communication Security and Key Safety -- Dynamic Secrets -- Dynamic Wireless Security -- Dynamic Key Management in a Smart Grid -- Secrecy in Communications -- Reliability Analysis for Communication Security -- Future Applications. | |
520 | _aDynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aElectrical engineering. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
700 | 1 |
_aGong, Weibo. _eauthor. |
|
700 | 1 |
_aTowsley, Don. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781461478300 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4614-7831-7 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c54783 _d54783 |