Dynamic Secrets in Communication Security

Author:   Sheng Xiao ,  Weibo Gong ,  Don Towsley
Publisher:   Springer-Verlag New York Inc.
Edition:   2014 ed.
ISBN:  

9781461478300


Pages:   136
Publication Date:   07 August 2013
Format:   Hardback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Dynamic Secrets in Communication Security


Add your own review!

Overview

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. ""Dynamic Secrets in Communication Security"" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. ""Dynamic Secrets in Communication Security"" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Full Product Details

Author:   Sheng Xiao ,  Weibo Gong ,  Don Towsley
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   2014 ed.
Dimensions:   Width: 15.50cm , Height: 1.00cm , Length: 23.50cm
Weight:   3.495kg
ISBN:  

9781461478300


ISBN 10:   1461478308
Pages:   136
Publication Date:   07 August 2013
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Reviews

From the reviews: It is based on the doctoral dissertation ... completed by Sheng Xiao of the University of Massachusetts, Amherst, in the year 2013, under the guidance of Weibo Gong and Don Towsley. The work is intended for sophisticated students of computer science as well as electrical engineering. It is also meant for research workers and practitioners involved in network security and/or wireless communications. ... The topics in the book are interesting. ... I recommend the book for security enthusiasts. (S. V. Nagaraj, Computing Reviews, April, 2014)


From the reviews: “It is based on the doctoral dissertation … completed by Sheng Xiao of the University of Massachusetts, Amherst, in the year 2013, under the guidance of Weibo Gong and Don Towsley. The work is intended for sophisticated students of computer science as well as electrical engineering. It is also meant for research workers and practitioners involved in network security and/or wireless communications. … The topics in the book are interesting. … I recommend the book for security enthusiasts.” (S. V. Nagaraj, Computing Reviews, April, 2014)


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List