spelling |
oapen-20.500.12657-416462021-07-21T04:20:10Z Security in Distributed, Grid, Mobile, and Pervasive Computing Xiao, Yang IT Security Networks Digital and Wireless Communication ENG InfoSECURITY ElectricalEngineering SCI-TECH ITECH INFORMATIONSCIENCE STM access based control hoc networks protocol role routing sensor wireless bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications bic Book Industry Communication::U Computing & information technology::UR Computer security bic Book Industry Communication::T Technology, engineering, agriculture::TH Energy technology & engineering::THR Electrical engineering bic Book Industry Communication::T Technology, engineering, agriculture::TJ Electronics & communications engineering::TJK Communications engineering / telecommunications::TJKT Telephone technology::TJKT1 Mobile phone technology This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. 2020-09-21T13:16:32Z 2020-09-21T13:16:32Z 2007 book ONIX_20200921_9780849379253_6 https://library.oapen.org/handle/20.500.12657/41646 eng application/pdf n/a 9780849379253.pdf https://www.taylorfrancis.com/books/9780429119347 Taylor & Francis Auerbach Publications 10.1201/9780849379253 10.1201/9780849379253 7b3c7b10-5b1e-40b3-860e-c6dd5197f0bb Auerbach Publications 440 open access
|
description |
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.
|