![]() |
![]() |
Your cart is empty |
||
Showing 1 - 3 of 3 matches in All Departments
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.
Providing the first truly comprehensive overview of Network Tomography - a novel network monitoring approach that makes use of inference techniques to reconstruct the internal network state from external vantage points - this rigorous yet accessible treatment of the fundamental theory and algorithms of network tomography covers the most prominent results demonstrated on real-world data, including identifiability conditions, measurement design algorithms, and network state inference algorithms, alongside practical tools for applying these techniques to real-world network management. It describes the main types of mathematical problems, along with their solutions and properties, and emphasizes the actions that can be taken to improve the accuracy of network tomography. With proofs and derivations introduced in an accessible language for easy understanding, this is an essential resource for professional engineers, academic researchers, and graduate students in network management and network science.
|
![]() ![]() You may like...
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn
Paperback
|