Lee, D. T.
Computer Security in the 21st Century
1. Introduction
D. T. Lee, S. P. Shieh, J. D. Tygar
I.Security Protocol Design
2. Challenges in Protocol Design and Analysis
Dieter Gollmann
3. Private Matching
Yaping Li, J. D. Tygar, Joseph M. Hellerstein
4. Authentication Protocol Analysis
Jonathan Millen
5. Self-Certified Approach for Authenticated Key Agreement
Tzong-Chen Wu, Yen-Ching Lin
II.P2P and Ad Hoc Networks
6. Experimenting with Admission Control in P2P Networks
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
7. Adaptive Random Key Distribution Schemes for Wireless Sensor Networks
Shih-I Huang, Shiuhpyng Shieh, S.Y. Wu
III.Intrusion Detection, Defense, Measurement
8. Measuring Relative Attack Surfaces
Michael Howard, Jon Pincus, Jeannette M. Wing
9. A Modeling of Intrusion Detection Systems with Identification Capability
Pei-Te Chen, Benjamin Tseng, Chi-Sung Laih
10. A Source-End Defense System Against DDoS Attacks
Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Sheng-Hsuan Wang
11. Beagle: Tracking System Failures for Reproducing Security Faults
Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, Deron Liang
IV.Multimedia Security
12. Web Application Security—Past, Present, and Future
Yao-Wen Huang, D. T. Lee
13. Securing JPEG2000 Code-Streams
Robert H. Deng, Yongdong Wu, Di Ma
14. A Secret Information Hiding Scheme Based on Switching Tree Coding
Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu
DRM-restrictions
Printing: not available
Clipboard copying: not available
Keywords: COMPUTERS / Computer Science COM014000
- Author(s)
- Lee, D. T.
- Shieh, S. P.
- Tygar, J. D.
- Publisher
- Springer
- Publication year
- 2005
- Language
- en
- Edition
- 1
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9780387240060