0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Architectures and Protocols for Secure Information Technology Infrastructures (Hardcover, New): Antonio Ruiz-Martinez, Rafael... Architectures and Protocols for Secure Information Technology Infrastructures (Hardcover, New)
Antonio Ruiz-Martinez, Rafael Marin-Lopez, Fernando Pereniguez Garcia
R5,571 Discovery Miles 55 710 Ships in 10 - 15 working days

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.

Enabling Seamless Handoff for Next Generation Networks (Paperback): Fernando Pere Guez Garc a., Fernando Pereniguez Garcia Enabling Seamless Handoff for Next Generation Networks (Paperback)
Fernando Pere Guez Garc a., Fernando Pereniguez Garcia
R2,073 Discovery Miles 20 730 Ships in 10 - 15 working days

One of the most challenging aspects in Next Generation Networks (NGNs) is the mechanism through which the different technologies will complement each other to achieve a constant access to networks. This research work deals with the problem of defining fast movements without interruptions (seamless handoffs) in NGNs. This objective is achieved through a secure key distribution process, which enables a fast re-authentication process providing both user anonymity and untraceability. The developed access control system offers a set of features not covered so far by a single solution: (1) applicable for EAP-based NGNs; (2) reduction of the authentication latency in mobile environments irrespective of the type of handoff performed by the user; (3) provision of strong security properties; (4) easy deployment in current networks; (5) compatibility with current standardized technologies; and (6) user privacy support.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Moord Op Stellenbosch - Twee Dekades Se…
Julian Jansen Paperback R350 R301 Discovery Miles 3 010
Conversations With A Gentle Soul
Ahmed Kathrada, Sahm Venter Paperback  (3)
R190 R149 Discovery Miles 1 490
Palaces Of Stone - Uncovering Ancient…
Mike Main, Thomas Huffman Paperback R280 R219 Discovery Miles 2 190
Song For Sarah - Lessons From My Mother
Jonathan Jansen, Naomi Jansen Hardcover  (3)
R90 R71 Discovery Miles 710
Nasty Women Talk Back - Feminist Essays…
Joy Watson Paperback  (2)
R406 Discovery Miles 4 060
Bullsh!t - 50 Fibs That Made South…
Jonathan Ancer Paperback  (2)
R270 R180 Discovery Miles 1 800
Wits University At 100 - From Excavation…
Wits Communications Paperback R375 R293 Discovery Miles 2 930
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan Paperback R360 R309 Discovery Miles 3 090
Light Through The Bars - Understanding…
Babychan Arackathara Paperback R30 R24 Discovery Miles 240
WTF - Capturing Zuma: A Cartoonist's…
Zapiro Zapiro, Mike Willis Paperback R295 R231 Discovery Miles 2 310

 

Partners