Dynamic Secrets in Communication Security

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrup...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Xiao, Sheng (Συγγραφέας), Gong, Weibo (Συγγραφέας), Towsley, Don (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: New York, NY : Springer New York : Imprint: Springer, 2014.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03108nam a22005415i 4500
001 978-1-4614-7831-7
003 DE-He213
005 20151218071417.0
007 cr nn 008mamaa
008 130806s2014 xxu| s |||| 0|eng d
020 |a 9781461478317  |9 978-1-4614-7831-7 
024 7 |a 10.1007/978-1-4614-7831-7  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Xiao, Sheng.  |e author. 
245 1 0 |a Dynamic Secrets in Communication Security  |h [electronic resource] /  |c by Sheng Xiao, Weibo Gong, Don Towsley. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2014. 
300 |a XI, 136 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Introduction -- Communication Security and Key Safety -- Dynamic Secrets -- Dynamic Wireless Security -- Dynamic Key Management in a Smart Grid -- Secrecy in Communications -- Reliability Analysis for Communication Security -- Future Applications. 
520 |a Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 0 |a Electrical engineering. 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Encryption. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Communications Engineering, Networks. 
700 1 |a Gong, Weibo.  |e author. 
700 1 |a Towsley, Don.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781461478300 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4614-7831-7  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)