Secure Broadcast Communication In Wired and Wireless Networks
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents an...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2003
|
Ausgabe: | 1st ed. 2003 |
Schlagworte: | |
Online-Zugang: | UBY01 URL des Eerstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047063971 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2003 |||| o||u| ||||||eng d | ||
020 | |a 9781461502296 |9 978-1-4615-0229-6 | ||
024 | 7 | |a 10.1007/978-1-4615-0229-6 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4615-0229-6 | ||
035 | |a (OCoLC)1227481509 | ||
035 | |a (DE-599)BVBBV047063971 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.82 |2 23 | |
100 | 1 | |a Perrig, Adrian |e Verfasser |4 aut | |
245 | 1 | 0 | |a Secure Broadcast Communication |b In Wired and Wireless Networks |c by Adrian Perrig, J.D. Tygar |
250 | |a 1st ed. 2003 | ||
264 | 1 | |a New York, NY |b Springer US |c 2003 | |
300 | |a 1 Online-Ressource (XIX, 214 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study | ||
650 | 4 | |a Cryptology | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a The Computing Profession | |
650 | 4 | |a Electrical Engineering | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computers | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Electrical engineering | |
700 | 1 | |a Tygar, J.D. |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780792376507 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461349761 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461502302 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4615-0229-6 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471083 | ||
966 | e | |u https://doi.org/10.1007/978-1-4615-0229-6 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182061392592896 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Perrig, Adrian Tygar, J.D |
author_facet | Perrig, Adrian Tygar, J.D |
author_role | aut aut |
author_sort | Perrig, Adrian |
author_variant | a p ap j t jt |
building | Verbundindex |
bvnumber | BV047063971 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4615-0229-6 (OCoLC)1227481509 (DE-599)BVBBV047063971 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-1-4615-0229-6 |
edition | 1st ed. 2003 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03065nmm a2200541zc 4500</leader><controlfield tag="001">BV047063971</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461502296</subfield><subfield code="9">978-1-4615-0229-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4615-0229-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4615-0229-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227481509</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047063971</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Perrig, Adrian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure Broadcast Communication</subfield><subfield code="b">In Wired and Wireless Networks</subfield><subfield code="c">by Adrian Perrig, J.D. Tygar</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2003</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 214 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">The Computing Profession</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tygar, J.D.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792376507</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461349761</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461502302</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4615-0229-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471083</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-0229-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047063971 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:21Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9781461502296 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471083 |
oclc_num | 1227481509 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XIX, 214 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer US |
record_format | marc |
spelling | Perrig, Adrian Verfasser aut Secure Broadcast Communication In Wired and Wireless Networks by Adrian Perrig, J.D. Tygar 1st ed. 2003 New York, NY Springer US 2003 1 Online-Ressource (XIX, 214 p) txt rdacontent c rdamedia cr rdacarrier Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study Cryptology Theory of Computation Computer Communication Networks Data Structures and Information Theory The Computing Profession Electrical Engineering Data encryption (Computer science) Computers Computer communication systems Data structures (Computer science) Electrical engineering Tygar, J.D. aut Erscheint auch als Druck-Ausgabe 9780792376507 Erscheint auch als Druck-Ausgabe 9781461349761 Erscheint auch als Druck-Ausgabe 9781461502302 https://doi.org/10.1007/978-1-4615-0229-6 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Perrig, Adrian Tygar, J.D Secure Broadcast Communication In Wired and Wireless Networks Cryptology Theory of Computation Computer Communication Networks Data Structures and Information Theory The Computing Profession Electrical Engineering Data encryption (Computer science) Computers Computer communication systems Data structures (Computer science) Electrical engineering |
title | Secure Broadcast Communication In Wired and Wireless Networks |
title_auth | Secure Broadcast Communication In Wired and Wireless Networks |
title_exact_search | Secure Broadcast Communication In Wired and Wireless Networks |
title_exact_search_txtP | Secure Broadcast Communication In Wired and Wireless Networks |
title_full | Secure Broadcast Communication In Wired and Wireless Networks by Adrian Perrig, J.D. Tygar |
title_fullStr | Secure Broadcast Communication In Wired and Wireless Networks by Adrian Perrig, J.D. Tygar |
title_full_unstemmed | Secure Broadcast Communication In Wired and Wireless Networks by Adrian Perrig, J.D. Tygar |
title_short | Secure Broadcast Communication |
title_sort | secure broadcast communication in wired and wireless networks |
title_sub | In Wired and Wireless Networks |
topic | Cryptology Theory of Computation Computer Communication Networks Data Structures and Information Theory The Computing Profession Electrical Engineering Data encryption (Computer science) Computers Computer communication systems Data structures (Computer science) Electrical engineering |
topic_facet | Cryptology Theory of Computation Computer Communication Networks Data Structures and Information Theory The Computing Profession Electrical Engineering Data encryption (Computer science) Computers Computer communication systems Data structures (Computer science) Electrical engineering |
url | https://doi.org/10.1007/978-1-4615-0229-6 |
work_keys_str_mv | AT perrigadrian securebroadcastcommunicationinwiredandwirelessnetworks AT tygarjd securebroadcastcommunicationinwiredandwirelessnetworks |