0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Architectures and Protocols for Secure Information Technology Infrastructures (Hardcover, New): Antonio Ruiz-Martinez, Rafael... Architectures and Protocols for Secure Information Technology Infrastructures (Hardcover, New)
Antonio Ruiz-Martinez, Rafael Marin-Lopez, Fernando Pereniguez Garcia
R5,571 Discovery Miles 55 710 Ships in 10 - 15 working days

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.

Enabling Seamless Handoff for Next Generation Networks (Paperback): Fernando Pere Guez Garc a., Fernando Pereniguez Garcia Enabling Seamless Handoff for Next Generation Networks (Paperback)
Fernando Pere Guez Garc a., Fernando Pereniguez Garcia
R2,073 Discovery Miles 20 730 Ships in 10 - 15 working days

One of the most challenging aspects in Next Generation Networks (NGNs) is the mechanism through which the different technologies will complement each other to achieve a constant access to networks. This research work deals with the problem of defining fast movements without interruptions (seamless handoffs) in NGNs. This objective is achieved through a secure key distribution process, which enables a fast re-authentication process providing both user anonymity and untraceability. The developed access control system offers a set of features not covered so far by a single solution: (1) applicable for EAP-based NGNs; (2) reduction of the authentication latency in mobile environments irrespective of the type of handoff performed by the user; (3) provision of strong security properties; (4) easy deployment in current networks; (5) compatibility with current standardized technologies; and (6) user privacy support.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Legend Of Zola Mahobe - And The…
Don Lepati, Nikolaos Kirkinis Paperback  (1)
R360 R309 Discovery Miles 3 090
Albertina Sisulu
Sindiwe Magona, Elinor Sisulu Paperback R200 R172 Discovery Miles 1 720
The Seed Is Mine - The Life Of Kas…
Charles Van Onselen Paperback R375 R300 Discovery Miles 3 000
Tell Me Your Story - South Africans…
Ruda Landman Paperback  (3)
R390 R335 Discovery Miles 3 350
Rhodes And His Banker - Empire, Wealth…
Richard Steyn Paperback R330 R220 Discovery Miles 2 200
1 Recce: Volume 3 - Through Stealth Our…
Alexander Strachan Paperback R360 R309 Discovery Miles 3 090
Reclaiming The Soil - A Black Girl's…
Rosie Motene Paperback R422 Discovery Miles 4 220
Prisoner 913 - The Release Of Nelson…
Riaan de Villiers, Jan-Ad Stemmet Paperback R399 R343 Discovery Miles 3 430
Searching For Papa's Secret In Hitler's…
Egonne Roth Paperback R295 R231 Discovery Miles 2 310
Too Black To Wear Whites
Jonty Winch, Richard Parry Paperback R290 R227 Discovery Miles 2 270

 

Partners