Secure Broadcast Communication - Perrig, Adrian
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre135,08 €
Produit Neuf
Ou 33,77 € /mois
- Livraison à 0,01 €
- Livré entre le 26 mai et le 2 juin
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781461349761_dbm
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Secure Broadcast Communication de Perrig, Adrian Format Broché - Livre Littérature Générale
0 avis sur Secure Broadcast Communication de Perrig, Adrian Format Broché - Livre Littérature Générale
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Erazer Beast 16 X1 Ultimate (Md 62732) Intel Core Ultra 9 275hx Ordinateur Portable 16" Quad Hd+ 32 Go Ddr5-Sdram 2 To Ssd Nvidia Geforce Rtx 5090 Wi-Fi 6e (802.11ax) Windows 11 Home Noir
Neuf dès 120,22 €
-
Bruegel. The Complete Works
Neuf dès 95,23 €
-
Portfolio Joubert "Les Scouts"
Occasion dès 75,00 €
-
Ocp Oracle Certified Professional Java Se 21 Developer Study Guide
Neuf dès 72,73 €
-
Moonwalk By Michael Jackson
2 avis
Occasion dès 70,46 €
-
The Oxford Handbook Of Latin American History
Neuf dès 80,98 €
-
Lingua Latina Per Se Illustrata Pars I I
Occasion dès 119,17 €
-
Mies Van Der Rohe
Occasion dès 96,00 €
-
Marianne North At Kew Gardens
Occasion dès 68,62 €
-
Giorgio Morandi Artista D'europa
Occasion dès 150,00 €
-
Lee Miller: An Exhibition Of Photographs, 1929-1964
Occasion dès 125,00 €
-
Hollywood Jewels: Movies, Jewelry, Stars
Occasion dès 131,99 €
-
Calvin Klein
Neuf dès 121,62 €
-
Manuel D'épigraphie Akkadienne - (Signes, Syllabaire, Idéogrammes)
1 avis
Occasion dès 182,60 €
-
In The American West 40th Anniversary Edition
1 avis
Neuf dès 80,00 €
Occasion dès 192,09 €
-
The Philip K. Dick Collection
Neuf dès 109,00 €
-
Designed By Peter Saville
1 avis
Occasion dès 99,00 €
-
Financial Markets And Institutions, Global Edition
Neuf dès 117,78 €
-
Conformal Field Theory
Neuf dès 190,65 €
-
Art Of Sea Of Thieves
1 avis
Neuf dès 127,99 €
Produits similaires
Présentation Secure Broadcast Communication de Perrig, Adrian Format Broché
- Livre Littérature Générale
Résumé :
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
Biographie:
Laurent Chuat is a postdoctoral researcher in the Network Security Group at ETH Zurich, where most of his research focuses on authentication and public-key infrastructures. He obtained his PhD in computer science from ETH Zurich in 2020 and co-authored the book SCION: A Secure Internet Architecture. Markus Legner is a senior researcher and lecturer in the Network Security Group, where he is conducting research on the design and verification of security protocols. He holds a Bachelor's degree in computer science from ETH Zurich as well as a doctorate in theoretical physics. David Basin is a professor of computer science at ETH Zurich and was head of the department from 2019 to 2020. David received his PhD in computer science from Cornell University in 1989 and his Habilitation in computer science from the University of Saarbr?cken in 1996. From 1997 to 2002, he held the Chair of Software Engineering at the University of Freiburg in Germany. He is the founding director of the Zurich Information Security Center (ZISC). David Hausheer is a professor at the Faculty of Computer Science at Otto von Guericke University Magdeburg, where he leads the Networks and Distributed Systems Lab. He received his degree in electrical engineering from ETH Zurich in 2001. Since 2001, he participated in numerous European Union projects. He obtained his PhD in 2005 and was then employed as a senior researcher and lecturer in the Department of Informatics (IFI) at the University of Zurich. Samuel Hitz holds a Master's degree in computer science from ETH Zurich and is the current CTO and previous CEO of Anapaya, which he co-founded with Adrian Perrig, David Basin, and Peter M?ller. He has worked on the implementation of SCION and, together with Anapaya's customers, on the real-world deployment and operation of an enterprise-oriented SCION network. Peter M?ller has been a professor of computer science at ETH Zurich since 2008. Before joining ETH Zurich, he worked as an IT project manager at Deutsche Bank in Frankfurt and held a position as researcher at Microsoft Research. Peter M?ller is working on programming languages, methods, and tools with the goal of enabling programmers to develop correct software. Adrian Perrig is a professor at the Department of Computer Science at ETH Zurich, where he leads the Network Security Group. He is also an adjunct professor of electrical and computer engineering at Carnegie Mellon University. From 2007 to 2012, he served as the technical director for Carnegie Mellon's CyLab. During that time, he led a research project aimed at building a next-generation Internet architecture, which was later renamed SCION....
Sommaire:
1. Introduction.- 1.1 Challenges of Broadcast Communication.- 1.2 Why is Security for Broadcasts Hard?.- 1.3 Security Requirements for Broadcast Applications.- 1.4 Novel Contributions.- 1.5 Scope of this Book.- 1.6 Book Overview.- 2. Cryptographic Fundamentals.- 2.1 Broadcast Network Requirements.- 2.2 Cryptographic Primitives.- 2.3 Efficiency of Cryptographic Primitives.- 2.4 Commitment Protocols.- 3. Tesla Broadcast Authentication.- 3.1 Requirements for Broadcast Authentication.- 3.2 The Basic TESLA Protocol.- 3.3 TIK: TESLA with Instant Key Disclosure.- 3.4 Time Synchronization.- 3.5 Variations.- 3.6 Denial-of-Service Protection.- 4. Biba Broadcast Authentication.- 4.1 The BiBa Signature Algorithm.- 4.2 The BiBa Broadcast Authentication Protocol.- 4.3 BiBa Broadcast Protocol Extensions.- 4.4 Practical Considerations.- 4.5 Variations and Extensions.- 4.6 One-Round BiBa is as secure as Multi-Round BiBa.- 4.7 Merkle Hash Trees for Ball Authentication.- 5. Emss, Mess, & Htss: Signatures for Broadcast.- 5.1 Efficient Multicast Stream Signature (EMSS).- 5.2 MESS.- 5.3 Variations.- 5.4 HTSS.- 6. Elk Key Distrubution.- 6.1 Introduction.- 6.2 Review of the LKH Key Distribution Protocol.- 6.3 Review of the OFT Key Distribution Protocol.- 6.4 Reliability for Key Update Messages.- 6.5 Four Basic Techniques.- 6.6 ELK: Efficient Large-Group Key Distribution.- 6.7 Applications and Practical Issues.- 6.8 Appendix.- 7. Sensor Network Security.- 7.1 Background.- 7.2 System Assumptions.- 7.3 Requirements for Sensor Network Security.- 7.4 Additional Notation.- 7.5 SNEP and ?TESLA.- 7.6 Implementation.- 7.7 Evaluation.- 7.8 Application of SNEP: Node-to-Node Key Agreement.- 8. Related Work.- 8.1 General Broadcast Security.- 8.2 Broadcast Authentication.- 8.3 Broadcast Signature.- 8.4Digital Signatures Based on One-way Functions without Trapdoors.- 8.5 Small-Group Key Agreement.- 8.6 Large-Group Key Distribution.- 9. Conclusion.- 9.1 Open Problems.- 10. Glossary.
Détails de conformité du produit
Personne responsable dans l'UE