Best-selling in Computer & IT
Save on Computer & IT
- £21.79Trending at £28.35
- £15.72Trending at £17.39
- £18.66Trending at £18.97
- £15.72Trending at £16.03
- £26.73Trending at £40.08
- £16.77Trending at £26.99
- £17.29Trending at £17.48
About this product
- Author(s)Adrian Perrig,J. Doug Tygar
- PublisherSpringer-Verlag New York Inc.
- Date of Publication23/10/2012
- GenreElectronics Engineering & Communications Engineering
- Place of PublicationNew York, NY
- Country of PublicationUnited States
- ImprintSpringer-Verlag New York Inc.
- Content Notebiography
- Weight373 g
- Width156 mm
- Height234 mm
- Spine12 mm
- Format DetailsTrade paperback (US)
- Edition StatementSoftcover reprint of the original 1st ed. 2003
- Table Of ContentsList of Figures. List of Tables. Preface. 1: Introduction. 1.1. Challenges of Broadcast Communication. 1.2. Why is Security for Broadcasts Hard? 1.3.Security Requirements for Broadcast Applications. 1.4. Novel Contributions. 1.5. Scope of This Book. 1.6. Book Overview. 2: Cryptographic Fundamentals. 2.1. Broadcast Network Requirements. 2.2. Cryptographic Primitives. 2.3. Efficiency in Cryptographic Primitives. 2.4. Commitment Protocols. 3: TESLA Broadcast Authentication. 3.1. Requirements for Broadcast Authentication. 3.2. The Basic TESLA Protocol. 3.3. TIK: TESLA With Instant Key Disclosure. 3.4. Time Synchronization. 3.5. Variations. 3.6. Denial-of-Service Protection. 4: BiBa Broadcast Authentication. 4.1. The BiBa Signature Algorithm. 4.2. The BiBa Broadcast Authentication Protocol. 4.3. BiBa Broadcast Protocol Extensions. 4.4. Practical Considerations. 4.5. Variations and Extensions. 4.6. One-Round BiBa is as Secure as Multi-Round BiBa. 4.7. Merkle Hash Trees for Ball Authentication. 5: EMSS, MESS, and HTSS: Signatures for Broadcast. 5.1. Efficient Multicast Stream Signature (EMSS). 5.2. MESS. Variations. 5.4. HTSS. 6: ELK Key Distribution. 6.1. Introduction. 6.2. Review of the LKH Key Distribution Protocol. Review of the OFT Key Distribution Protocol. 6.4Reliability for Key Update Messages. 6.5. Four Basic Techniques. 6.6. ELK: Efficient Large-Group Key Distribution. 6.7. Applications and Practical Issues. 6.8. Appendix. 7: Sensor Network Security. 7.1. Background. 7.2. System Assumptions. 7.3. Requirements for Sensor Network Security. 7.4. Additional Notation. 7.5. SNEP and mTESLA. 7.6. Implementation. 7.7. Evaluation. 7.8. Application of SNEP: Node-to-Node Key Agreement. 8: Related Work. 8.1. General Broadcast Security. 8.2.Broadcast Authentication. 8.3. Broadcast Signature. 8.4. Digital Signatures Based on One-way Functions without Trapdoors. 8.5. Small-Group Key Arrangement. 8.6. Large-Group Key Distribution. 9: Conclusion. 9.1. Open Problems. 10: Glossary. References. Index.
This item doesn't belong on this page.
Thanks, we'll look into this.