000 | 01755cam a2200229Ii 4500 | ||
---|---|---|---|
999 |
_c22971 _d22971 |
||
001 | 56134 | ||
020 | _a9781461478300 | ||
040 | _aNWU | ||
082 | 0 | 4 | _a005.82 |
100 | 1 |
_aXiao, Sheng., _938894 |
|
245 | 1 | 0 |
_aDynamic secrets in communication security / _cSheng Xiao, Weibo Gong, Donald Towsley. |
300 |
_axi, 136 p. ; _bill. : _c24 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
520 | _aDynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering. | ||
650 | 0 |
_aComputer security. _9641 |
|
650 | 0 |
_aData encryption (Computer science) _95422 |
|
650 | 0 |
_aCryptography. _95423 |
|
700 | 1 |
_aTowsley, Don. _938895 |
|
700 | 1 |
_aGong, Weibo. _938896 |
|
856 |
_uhttps://uowd.box.com/s/5vnk9zyu38eescpj5fjcd66tyw32exw9 _zLocation Map |
||
942 |
_cREGULAR _2ddc |