Bibliographic Information

Network security

Scott C.-H. Huang, David MacCallum, Ding-Zhu Du, editors

Springer, c2010

Search this Book/Journal
Note

Includes bibliographical references and index

Description and Table of Contents

Description

This book provides a reference tool for the increasing number of scientists whose research is more or less involved in network security. Coverage includes network design and modeling, network management, data management, security and applications.

Table of Contents

Secure Metering Schemes.- A Cryptographic Framework for the Controlled Release Of Certified Data.- Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions.- Web Forms and Untraceable DDoS Attacks.- Mechanical Verification of Cryptographic Protocols.- Routing Security in Ad Hoc Wireless Networks.- Insider Threat Assessment: Model, Analysis and Tool.- Toward Automated Intrusion Alert Analysis.- Conventional Cryptographic Primitives.- Efficient Trapdoor-Based Client Puzzle Against DoS Attacks.- Attacks and Countermeasures in Sensor Networks: A Survey.

by "Nielsen BookData"

Details
Page Top