Login

Lee, D. T.

Computer Security in the 21st Century

Lee, D. T. - Computer Security in the 21st Century, ebook

126,45€

Ebook, PDF with Adobe DRM
ISBN: 9780387240060
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Introduction
D. T. Lee, S. P. Shieh, J. D. Tygar

I.Security Protocol Design

2. Challenges in Protocol Design and Analysis
Dieter Gollmann

3. Private Matching
Yaping Li, J. D. Tygar, Joseph M. Hellerstein

4. Authentication Protocol Analysis
Jonathan Millen

5. Self-Certified Approach for Authenticated Key Agreement
Tzong-Chen Wu, Yen-Ching Lin

II.P2P and Ad Hoc Networks

6. Experimenting with Admission Control in P2P Networks
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi

7. Adaptive Random Key Distribution Schemes for Wireless Sensor Networks
Shih-I Huang, Shiuhpyng Shieh, S.Y. Wu

III.Intrusion Detection, Defense, Measurement

8. Measuring Relative Attack Surfaces
Michael Howard, Jon Pincus, Jeannette M. Wing

9. A Modeling of Intrusion Detection Systems with Identification Capability
Pei-Te Chen, Benjamin Tseng, Chi-Sung Laih

10. A Source-End Defense System Against DDoS Attacks
Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Sheng-Hsuan Wang

11. Beagle: Tracking System Failures for Reproducing Security Faults
Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, Deron Liang

IV.Multimedia Security

12. Web Application Security—Past, Present, and Future
Yao-Wen Huang, D. T. Lee

13. Securing JPEG2000 Code-Streams
Robert H. Deng, Yongdong Wu, Di Ma

14. A Secret Information Hiding Scheme Based on Switching Tree Coding
Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu

DRM-restrictions

Printing: not available
Clipboard copying: not available

Keywords: COMPUTERS / Computer Science COM014000

Author(s)
 
 
Publisher
Springer
Publication year
2005
Language
en
Edition
1
Category
Information Technology, Telecommunications
Format
Ebook
eISBN (PDF)
9780387240060

Similar titles