Secure Broadcast Communication In Wired and Wireless Networks

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents an...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Perrig, Adrian (VerfasserIn), Tygar, J.D (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York, NY Springer US 2003
Ausgabe:1st ed. 2003
Schlagworte:
Online-Zugang:UBY01
URL des Eerstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV047063971
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 201216s2003 |||| o||u| ||||||eng d
020 |a 9781461502296  |9 978-1-4615-0229-6 
024 7 |a 10.1007/978-1-4615-0229-6  |2 doi 
035 |a (ZDB-2-SCS)978-1-4615-0229-6 
035 |a (OCoLC)1227481509 
035 |a (DE-599)BVBBV047063971 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-706 
082 0 |a 005.82  |2 23 
100 1 |a Perrig, Adrian  |e Verfasser  |4 aut 
245 1 0 |a Secure Broadcast Communication  |b In Wired and Wireless Networks  |c by Adrian Perrig, J.D. Tygar 
250 |a 1st ed. 2003 
264 1 |a New York, NY  |b Springer US  |c 2003 
300 |a 1 Online-Ressource (XIX, 214 p) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
520 |a Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study 
650 4 |a Cryptology 
650 4 |a Theory of Computation 
650 4 |a Computer Communication Networks 
650 4 |a Data Structures and Information Theory 
650 4 |a The Computing Profession 
650 4 |a Electrical Engineering 
650 4 |a Data encryption (Computer science) 
650 4 |a Computers 
650 4 |a Computer communication systems 
650 4 |a Data structures (Computer science) 
650 4 |a Electrical engineering 
700 1 |a Tygar, J.D.  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9780792376507 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781461349761 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781461502302 
856 4 0 |u https://doi.org/10.1007/978-1-4615-0229-6  |x Verlag  |z URL des Eerstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
940 1 |q ZDB-2-SCS_2000/2004 
999 |a oai:aleph.bib-bvb.de:BVB01-032471083 
966 e |u https://doi.org/10.1007/978-1-4615-0229-6  |l UBY01  |p ZDB-2-SCS  |q ZDB-2-SCS_2000/2004  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1804182061392592896
adam_txt
any_adam_object
any_adam_object_boolean
author Perrig, Adrian
Tygar, J.D
author_facet Perrig, Adrian
Tygar, J.D
author_role aut
aut
author_sort Perrig, Adrian
author_variant a p ap
j t jt
building Verbundindex
bvnumber BV047063971
collection ZDB-2-SCS
ctrlnum (ZDB-2-SCS)978-1-4615-0229-6
(OCoLC)1227481509
(DE-599)BVBBV047063971
dewey-full 005.82
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.82
dewey-search 005.82
dewey-sort 15.82
dewey-tens 000 - Computer science, information, general works
discipline Informatik
discipline_str_mv Informatik
doi_str_mv 10.1007/978-1-4615-0229-6
edition 1st ed. 2003
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03065nmm a2200541zc 4500</leader><controlfield tag="001">BV047063971</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461502296</subfield><subfield code="9">978-1-4615-0229-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4615-0229-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4615-0229-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227481509</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047063971</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Perrig, Adrian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure Broadcast Communication</subfield><subfield code="b">In Wired and Wireless Networks</subfield><subfield code="c">by Adrian Perrig, J.D. Tygar</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2003</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 214 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">The Computing Profession</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tygar, J.D.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792376507</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461349761</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461502302</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4615-0229-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471083</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-0229-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV047063971
illustrated Not Illustrated
index_date 2024-07-03T16:12:21Z
indexdate 2024-07-10T09:01:34Z
institution BVB
isbn 9781461502296
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032471083
oclc_num 1227481509
open_access_boolean
owner DE-706
owner_facet DE-706
physical 1 Online-Ressource (XIX, 214 p)
psigel ZDB-2-SCS
ZDB-2-SCS_2000/2004
ZDB-2-SCS ZDB-2-SCS_2000/2004
publishDate 2003
publishDateSearch 2003
publishDateSort 2003
publisher Springer US
record_format marc
spelling Perrig, Adrian Verfasser aut
Secure Broadcast Communication In Wired and Wireless Networks by Adrian Perrig, J.D. Tygar
1st ed. 2003
New York, NY Springer US 2003
1 Online-Ressource (XIX, 214 p)
txt rdacontent
c rdamedia
cr rdacarrier
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study
Cryptology
Theory of Computation
Computer Communication Networks
Data Structures and Information Theory
The Computing Profession
Electrical Engineering
Data encryption (Computer science)
Computers
Computer communication systems
Data structures (Computer science)
Electrical engineering
Tygar, J.D. aut
Erscheint auch als Druck-Ausgabe 9780792376507
Erscheint auch als Druck-Ausgabe 9781461349761
Erscheint auch als Druck-Ausgabe 9781461502302
https://doi.org/10.1007/978-1-4615-0229-6 Verlag URL des Eerstveröffentlichers Volltext
spellingShingle Perrig, Adrian
Tygar, J.D
Secure Broadcast Communication In Wired and Wireless Networks
Cryptology
Theory of Computation
Computer Communication Networks
Data Structures and Information Theory
The Computing Profession
Electrical Engineering
Data encryption (Computer science)
Computers
Computer communication systems
Data structures (Computer science)
Electrical engineering
title Secure Broadcast Communication In Wired and Wireless Networks
title_auth Secure Broadcast Communication In Wired and Wireless Networks
title_exact_search Secure Broadcast Communication In Wired and Wireless Networks
title_exact_search_txtP Secure Broadcast Communication In Wired and Wireless Networks
title_full Secure Broadcast Communication In Wired and Wireless Networks by Adrian Perrig, J.D. Tygar
title_fullStr Secure Broadcast Communication In Wired and Wireless Networks by Adrian Perrig, J.D. Tygar
title_full_unstemmed Secure Broadcast Communication In Wired and Wireless Networks by Adrian Perrig, J.D. Tygar
title_short Secure Broadcast Communication
title_sort secure broadcast communication in wired and wireless networks
title_sub In Wired and Wireless Networks
topic Cryptology
Theory of Computation
Computer Communication Networks
Data Structures and Information Theory
The Computing Profession
Electrical Engineering
Data encryption (Computer science)
Computers
Computer communication systems
Data structures (Computer science)
Electrical engineering
topic_facet Cryptology
Theory of Computation
Computer Communication Networks
Data Structures and Information Theory
The Computing Profession
Electrical Engineering
Data encryption (Computer science)
Computers
Computer communication systems
Data structures (Computer science)
Electrical engineering
url https://doi.org/10.1007/978-1-4615-0229-6
work_keys_str_mv AT perrigadrian securebroadcastcommunicationinwiredandwirelessnetworks
AT tygarjd securebroadcastcommunicationinwiredandwirelessnetworks