|
|
|
|
LEADER |
03334nam a22005415i 4500 |
001 |
978-0-387-68848-0 |
003 |
DE-He213 |
005 |
20151204175902.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387688480
|9 978-0-387-68848-0
|
024 |
7 |
|
|a 10.1007/978-0-387-68848-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Sun, Yan.
|e author.
|
245 |
1 |
0 |
|a Network-Aware Security for Group Communications
|h [electronic resource] /
|c by Yan Sun, Wade Trappe, K. J. R. Liu.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2008.
|
300 |
|
|
|a XVIII, 304 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Centralized Multi-user Key Management -- Group Key Agreement Techniques in Heterogeneous Networks -- Optimizing Rekeying Costs in Group Key Agreement -- Optimizing Multicast Key Management for Cellular Multicasting -- Key Management and Distribution for Securing Multimedia Multicasts -- Hierarchical Access Control for Multi-Group Scenarios -- Protecting Membership Information in Secure Multicasting -- Reducing Delay and Enhancing DoS Resistance in Multicast Authentication -- An Authentication Service for Sensor and Ad Hoc Networks.
|
520 |
|
|
|a Network-Aware Security for Group Communications fills a growing need in the research community for a reference that describes the state-of-the-art in securing group communications in emerging networks and for future applications. The growth of multi-user services makes it essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group communications. This book is focused on tailoring security solutions to the underlying network architecture (such as the wireless cellular network, or ad hoc and sensor networks), or to targeted applications using methods tailored for that application (such as multimedia multicasts). The authors focus the discussion on two fundamental security issues for group communications: providing efficient key management for providing confidentiality, and providing authentication for group services.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Signal, Image and Speech Processing.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
700 |
1 |
|
|a Trappe, Wade.
|e author.
|
700 |
1 |
|
|a Liu, K. J. R.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387688466
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-0-387-68848-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|