Dynamic Secrets in Communication Security

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Dynamic Secrets in Communication Security by Sheng Xiao, Weibo Gong, Don Towsley, Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Sheng Xiao, Weibo Gong, Don Towsley ISBN: 9781461478317
Publisher: Springer New York Publication: August 13, 2013
Imprint: Springer Language: English
Author: Sheng Xiao, Weibo Gong, Don Towsley
ISBN: 9781461478317
Publisher: Springer New York
Publication: August 13, 2013
Imprint: Springer
Language: English

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

More books from Springer New York

Cover of the book Human Auditory Development by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Management of Functional Gastrointestinal Disorders in Children by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Energy and the Wealth of Nations by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Longwave Instabilities and Patterns in Fluids by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Model Systems in Catalysis by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Understanding Social Engineering Based Scams by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book The Influence of Attention, Learning, and Motivation on Visual Search by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Postponement Strategies in Supply Chain Management by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Training and Practice for Modern Day Archaeologists by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Residue Reviews by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Minimally Invasive and Robotic Thyroid and Parathyroid Surgery by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Hybrid PET/CT and SPECT/CT Imaging by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Patient Preparation for Bariatric Surgery by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book R for SAS and SPSS Users by Sheng Xiao, Weibo Gong, Don Towsley
Cover of the book Reviews of Environmental Contamination and Toxicology by Sheng Xiao, Weibo Gong, Don Towsley
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy