PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

Dynamic Secrets in Communication Security

Sheng Xiao Weibo Gong Don Towsley

$130.95   $105.07

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer-Verlag New York Inc.
16 October 2015
"Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication.

""Dynamic Secrets in Communication Security"" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also

illustrates that a dynamic secret based security scheme

guarantees

impersonation attacks are detected even if an adversary steals a user’s password or their key is lost.

Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. ""Dynamic Secrets in Communication Security"" is also a valuable secondary text for advanced-level students in computer science and electrical engineering."

By:   , ,
Imprint:   Springer-Verlag New York Inc.
Country of Publication:   United States
Edition:   Softcover reprint of the original 1st ed. 2014
Dimensions:   Height: 235mm,  Width: 155mm,  Spine: 8mm
Weight:   454g
ISBN:   9781493902293
ISBN 10:   1493902296
Pages:   136
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active

Reviews for Dynamic Secrets in Communication Security

From the reviews: “It is based on the doctoral dissertation … completed by Sheng Xiao of the University of Massachusetts, Amherst, in the year 2013, under the guidance of Weibo Gong and Don Towsley. The work is intended for sophisticated students of computer science as well as electrical engineering. It is also meant for research workers and practitioners involved in network security and/or wireless communications. … The topics in the book are interesting. … I recommend the book for security enthusiasts.” (S. V. Nagaraj, Computing Reviews, April, 2014)


See Also