Dynamic Secrets in Communication Security
Title | Dynamic Secrets in Communication Security PDF eBook |
Author | Sheng Xiao |
Publisher | Springer Science & Business Media |
Pages | 137 |
Release | 2013-08-13 |
Genre | Computers |
ISBN | 1461478316 |
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.
Dynamic Secrets in Communication Security
Title | Dynamic Secrets in Communication Security PDF eBook |
Author | Sheng Xiao |
Publisher | Springer |
Pages | 136 |
Release | 2013-08-07 |
Genre | Computers |
ISBN | 9781461478324 |
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.
Energy-Efficient Underwater Wireless Communications and Networking
Title | Energy-Efficient Underwater Wireless Communications and Networking PDF eBook |
Author | Goyal, Nitin |
Publisher | IGI Global |
Pages | 339 |
Release | 2020-09-04 |
Genre | Technology & Engineering |
ISBN | 1799836428 |
Underwater wireless sensor networks (UWSN) are envisioned as an aquatic medium for a variety of applications including oceanographic data collection, disaster management or prevention, assisted navigation, attack protection, and pollution monitoring. Similar to terrestrial wireless sensor networks (WSN), UWSNs consist of sensor nodes that collect the information and pass it to a base station; however, researchers have to face many challenges in executing the network in an aquatic medium. Energy-Efficient Underwater Wireless Communications and Networking is a crucial reference source that covers existing and future possibilities of the area as well as the current challenges presented in the implementation of underwater sensor networks. While highlighting topics such as digital signal processing, underwater localization, and acoustic channel modeling, this publication is ideally designed for machine learning experts, IT specialists, government agencies, oceanic engineers, communication experts, researchers, academicians, students, and environmental agencies concerned with optimized data flow in communication network, securing assets, and mitigating security attacks.
Information and Communication Security
Title | Information and Communication Security PDF eBook |
Author | Sihan Qing |
Publisher | Springer Science & Business Media |
Pages | 444 |
Release | 2011-11-14 |
Genre | Computers |
ISBN | 3642252427 |
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.
Information and Communications Security
Title | Information and Communications Security PDF eBook |
Author | Tat Wing Chim |
Publisher | Springer |
Pages | 519 |
Release | 2012-10-15 |
Genre | Computers |
ISBN | 3642341292 |
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
Information and Communications Security
Title | Information and Communications Security PDF eBook |
Author | Yongfei Han |
Publisher | Springer Science & Business Media |
Pages | 500 |
Release | 1997-10-22 |
Genre | Business & Economics |
ISBN | 9783540636960 |
This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997. The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.
High Performance Architecture and Grid Computing
Title | High Performance Architecture and Grid Computing PDF eBook |
Author | Archana Mantri |
Publisher | Springer Science & Business Media |
Pages | 675 |
Release | 2011-07-05 |
Genre | Computers |
ISBN | 3642225764 |
This book constitutes the refereeds proceedings of the International Conference on High Performance Architecture and Grid Computing, HPAGC 2011, held in Chandigarh, India, in July 2011. The 87 revised full papers presented were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on grid and cloud computing; high performance architecture; information management and network security.