|
Showing 1 - 3 of
3 matches in All Departments
Dynamic secrets are constantly generated and updated from messages
exchanged between two communication users. When dynamic secrets are
used as a complement to existing secure communication systems, a
stolen key or password can be quickly and automatically reverted to
its secret status without disrupting communication. "Dynamic
Secrets in Communication Security" presents unique security
properties and application studies for this technology. Password
theft and key theft no longer pose serious security threats when
parties frequently use dynamic secrets. This book also illustrates
that a dynamic secret based security scheme guarantees
impersonation attacks are detected even if an adversary steals a
user's password or their key is lost. Practitioners and researchers
working in network security or wireless communications will find
this book a must-have reference. "Dynamic Secrets in Communication
Security" is also a valuable secondary text for advanced-level
students in computer science and electrical engineering.
Dynamic secrets are constantly generated and updated from messages
exchanged between two communication users. When dynamic secrets are
used as a complement to existing secure communication systems, a
stolen key or password can be quickly and automatically reverted to
its secret status without disrupting communication. "Dynamic
Secrets in Communication Security" presents unique security
properties and application studies for this technology. Password
theft and key theft no longer pose serious security threats when
parties frequently use dynamic secrets. This book also illustrates
that a dynamic secret based security scheme guarantees
impersonation attacks are detected even if an adversary steals a
user's password or their key is lost. Practitioners and researchers
working in network security or wireless communications will find
this book a must-have reference. "Dynamic Secrets in Communication
Security" is also a valuable secondary text for advanced-level
students in computer science and electrical engineering.
Providing the first truly comprehensive overview of Network
Tomography - a novel network monitoring approach that makes use of
inference techniques to reconstruct the internal network state from
external vantage points - this rigorous yet accessible treatment of
the fundamental theory and algorithms of network tomography covers
the most prominent results demonstrated on real-world data,
including identifiability conditions, measurement design
algorithms, and network state inference algorithms, alongside
practical tools for applying these techniques to real-world network
management. It describes the main types of mathematical problems,
along with their solutions and properties, and emphasizes the
actions that can be taken to improve the accuracy of network
tomography. With proofs and derivations introduced in an accessible
language for easy understanding, this is an essential resource for
professional engineers, academic researchers, and graduate students
in network management and network science.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.