Dynamic Secrets in Communication Security (Hardcover)
Sheng Xiao
Sold by AussieBookSeller, Truganina, VIC, Australia
AbeBooks Seller since June 22, 2007
New - Hardcover
Condition: New
Quantity: 1 available
Add to basketSold by AussieBookSeller, Truganina, VIC, Australia
AbeBooks Seller since June 22, 2007
Condition: New
Quantity: 1 available
Add to basketHardcover. Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication."Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a users password or their key is lost.Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering. Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Seller Inventory # 9781461478300
From the reviews:
“It is based on the doctoral dissertation ... completed by Sheng Xiao of the University of Massachusetts, Amherst, in the year 2013, under the guidance of Weibo Gong and Don Towsley. The work is intended for sophisticated students of computer science as well as electrical engineering. It is also meant for research workers and practitioners involved in network security and/or wireless communications. ... The topics in the book are interesting. ... I recommend the book for security enthusiasts.” (S. V. Nagaraj, Computing Reviews, April, 2014)
"About this title" may belong to another edition of this title.
We guarantee the condition of every book as it's described on the Abebooks web sites. If you're dissatisfied with your purchase (Incorrect Book/Not as Described/Damaged) or if the order hasn't arrived, you're eligible for a refund within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days.
Please note that titles are dispatched from our UK and NZ warehouse. Delivery times specified in shipping terms. Orders ship within 2 business days. Delivery to your door then takes 8-15 days.
Order quantity | 25 to 45 business days | 8 to 14 business days |
---|---|---|
First item | US$ 37.00 | US$ 44.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.