Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Mobility.- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks.- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems.- Privacy-Aware Location Database Service for Granular Queries.- Attacks and Secure Implementations.- Algebraic Attacks on RFID Protocols.- Anti-counterfeiting Using Memory Spots.- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.- Performance and Security.- Measurement Analysis When Benchmarking Java Card Platforms.- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card.- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.- Cryptography.- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks.- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure.- PKIX Certificate Status in Hybrid MANETs.
| Erscheint lt. Verlag | 17.8.2009 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XII, 167 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 284 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | authentication • collision attacks • Cryptanalysis • cryptography • Data Security • Hardcover, Softcover / Informatik, EDV/Informatik • Information Security • Intrusion Detection • java card • key distribution • Manet • mobile ad hoc network • Mobile Agent Systems • overlay networks • P2P • RFID • RFID (Radio Frequency Identificatio) • rsa • Smart cards • streamin • Streaming • wireless sensor networks |
| ISBN-13 | 9783642039430 / 9783642039430 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich