Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Zugriff
  • 1
    UID:
    almahu_9948621101902882
    Umfang: XIX, 214 p. , online resource.
    Ausgabe: 1st ed. 2003.
    ISBN: 9781461502296
    Inhalt: Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
    Anmerkung: 1. Introduction -- 1.1 Challenges of Broadcast Communication -- 1.2 Why is Security for Broadcasts Hard? -- 1.3 Security Requirements for Broadcast Applications -- 1.4 Novel Contributions -- 1.5 Scope of this Book -- 1.6 Book Overview -- 2. Cryptographic Fundamentals -- 2.1 Broadcast Network Requirements -- 2.2 Cryptographic Primitives -- 2.3 Efficiency of Cryptographic Primitives -- 2.4 Commitment Protocols -- 3. Tesla Broadcast Authentication -- 3.1 Requirements for Broadcast Authentication -- 3.2 The Basic TESLA Protocol -- 3.3 TIK: TESLA with Instant Key Disclosure -- 3.4 Time Synchronization -- 3.5 Variations -- 3.6 Denial-of-Service Protection -- 4. Biba Broadcast Authentication -- 4.1 The BiBa Signature Algorithm -- 4.2 The BiBa Broadcast Authentication Protocol -- 4.3 BiBa Broadcast Protocol Extensions -- 4.4 Practical Considerations -- 4.5 Variations and Extensions -- 4.6 One-Round BiBa is as secure as Multi-Round BiBa -- 4.7 Merkle Hash Trees for Ball Authentication -- 5. Emss, Mess, & Htss: Signatures for Broadcast -- 5.1 Efficient Multicast Stream Signature (EMSS) -- 5.2 MESS -- 5.3 Variations -- 5.4 HTSS -- 6. Elk Key Distrubution -- 6.1 Introduction -- 6.2 Review of the LKH Key Distribution Protocol -- 6.3 Review of the OFT Key Distribution Protocol -- 6.4 Reliability for Key Update Messages -- 6.5 Four Basic Techniques -- 6.6 ELK: Efficient Large-Group Key Distribution -- 6.7 Applications and Practical Issues -- 6.8 Appendix -- 7. Sensor Network Security -- 7.1 Background -- 7.2 System Assumptions -- 7.3 Requirements for Sensor Network Security -- 7.4 Additional Notation -- 7.5 SNEP and µTESLA -- 7.6 Implementation -- 7.7 Evaluation -- 7.8 Application of SNEP: Node-to-Node Key Agreement -- 8. Related Work -- 8.1 General Broadcast Security -- 8.2 Broadcast Authentication -- 8.3 Broadcast Signature -- 8.4 Digital Signatures Based on One-way Functions without Trapdoors -- 8.5 Small-Group Key Agreement -- 8.6 Large-Group Key Distribution -- 9. Conclusion -- 9.1 Open Problems -- 10. Glossary.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9780792376507
    Weitere Ausg.: Printed edition: ISBN 9781461349761
    Weitere Ausg.: Printed edition: ISBN 9781461502302
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Boston, MA : Springer US
    UID:
    gbv_775338362
    Umfang: Online-Ressource (XIX, 214 p) , online resource
    Ausgabe: Reproduktion Springer eBook Collection. Computer Science
    ISBN: 9781461502296
    Inhalt: Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study
    Anmerkung: 1. Introduction1.1 Challenges of Broadcast Communication -- 1.2 Why is Security for Broadcasts Hard? -- 1.3 Security Requirements for Broadcast Applications -- 1.4 Novel Contributions -- 1.5 Scope of this Book -- 1.6 Book Overview -- 2. Cryptographic Fundamentals -- 2.1 Broadcast Network Requirements -- 2.2 Cryptographic Primitives -- 2.3 Efficiency of Cryptographic Primitives -- 2.4 Commitment Protocols -- 3. Tesla Broadcast Authentication -- 3.1 Requirements for Broadcast Authentication -- 3.2 The Basic TESLA Protocol -- 3.3 TIK: TESLA with Instant Key Disclosure -- 3.4 Time Synchronization -- 3.5 Variations -- 3.6 Denial-of-Service Protection -- 4. Biba Broadcast Authentication -- 4.1 The BiBa Signature Algorithm -- 4.2 The BiBa Broadcast Authentication Protocol -- 4.3 BiBa Broadcast Protocol Extensions -- 4.4 Practical Considerations -- 4.5 Variations and Extensions -- 4.6 One-Round BiBa is as secure as Multi-Round BiBa -- 4.7 Merkle Hash Trees for Ball Authentication -- 5. Emss, Mess, & Htss: Signatures for Broadcast -- 5.1 Efficient Multicast Stream Signature (EMSS) -- 5.2 MESS -- 5.3 Variations -- 5.4 HTSS -- 6. Elk Key Distrubution -- 6.1 Introduction -- 6.2 Review of the LKH Key Distribution Protocol -- 6.3 Review of the OFT Key Distribution Protocol -- 6.4 Reliability for Key Update Messages -- 6.5 Four Basic Techniques -- 6.6 ELK: Efficient Large-Group Key Distribution -- 6.7 Applications and Practical Issues -- 6.8 Appendix -- 7. Sensor Network Security -- 7.1 Background -- 7.2 System Assumptions -- 7.3 Requirements for Sensor Network Security -- 7.4 Additional Notation -- 7.5 SNEP and µTESLA -- 7.6 Implementation -- 7.7 Evaluation -- 7.8 Application of SNEP: Node-to-Node Key Agreement -- 8. Related Work -- 8.1 General Broadcast Security -- 8.2 Broadcast Authentication -- 8.3 Broadcast Signature -- 8.4 Digital Signatures Based on One-way Functions without Trapdoors -- 8.5 Small-Group Key Agreement -- 8.6 Large-Group Key Distribution -- 9. Conclusion -- 9.1 Open Problems -- 10. Glossary.
    Weitere Ausg.: ISBN 9781461349761
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9780792376507
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9781461349761
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9781461502302
    Sprache: Englisch
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9781461501312?
Meinten Sie 9781461500032?
Meinten Sie 9780471502302?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz