Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Computer Security in the 21st Century

 eBook
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780387240060
Veröffentl:
2005
Einband:
eBook
Seiten:
268
Autor:
D. T. Lee
Serie:
Springer
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
"Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
INTRODUCTION, D. T. Lee, S. P. Shieh, J. D. Tygar. -PART I: SECURITY PROTOCOL DESIGN. -Challenges in Protocol Design and Analysis, Dieter Gollmann. --Private Matching,Yaping Li, J. D. Tygar, Joseph M. Hellerstein. -Authentication Protocol Analysis, Jonathan Millen. -Self-certified Approach for Authenticated Key Agreement, Tzong-Chen Wu, Yen-Ching Lin. -PART II P2P AND AD HOC NETWORKS. -Experimenting with Admission Control in P2P Networks, Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi -Adaptive Random Key Distribution Schemes for Wireless Sensor Networks, Shih-I Huang, Shiuhpyng Shieh, S.Y. Wu. -PART III INTRUSION DETECTION, DEFENSE, MEASUREMENT. -Measuring Relative Attack Surfaces, Michael Howard, Jon Pincus, Jeannette M. Wing. -A Modeling of Intrusion Detection Systems with Identification Capability, Pei-Te Chen, Benjamin Tseng, Chi-Sung Laih. -A Source-End Defense System against DDoS Attacks, Fu-Yuan Lee, Shiuhpyng Shieh, JuiTing Shieh, Sheng-Hsuan Wang. -BEAGLE: Tracking System Failures for Reproducing Security Faults, Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, Deron Liang. -Part IV MULTIMEDIA SECURITY. -Web Application Security-Past, Present, and Future, Yao-Wen Huang, D. T. Lee. -Securing JPEG2000 CodeStreams, Robert H. Deng, Yongdong Wu, Di Ma. -A Secret Information Hiding Scheme Based on Switching Tree Coding, Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu .

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga