Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Springer Berlin (Verlag)
978-3-642-03943-0 (ISBN)
Mobility.- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks.- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems.- Privacy-Aware Location Database Service for Granular Queries.- Attacks and Secure Implementations.- Algebraic Attacks on RFID Protocols.- Anti-counterfeiting Using Memory Spots.- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.- Performance and Security.- Measurement Analysis When Benchmarking Java Card Platforms.- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card.- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.- Cryptography.- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks.- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure.- PKIX Certificate Status in Hybrid MANETs.
Erscheint lt. Verlag | 17.8.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 167 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 284 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • collision attacks • Cryptanalysis • cryptography • Data Security • Hardcover, Softcover / Informatik, EDV/Informatik • Information Security • Intrusion Detection • java card • key distribution • Manet • mobile ad hoc network • Mobile Agent Systems • overlay networks • P2P • RFID • RFID (Radio Frequency Identificatio) • rsa • Smart cards • streamin • Streaming • wireless sensor networks |
ISBN-10 | 3-642-03943-X / 364203943X |
ISBN-13 | 978-3-642-03943-0 / 9783642039430 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich