Description |
1 online resource (xi, 268 pages) : illustrations |
Contents |
Cover -- Table of Contents -- List of Figures -- Chapter 1 Introduction -- Part I Security Protocol Design -- Chapter 2 Challenges in Protocol Design and Analysis -- 1. Introduction -- 2. Purpose of Analysis -- 3. The Environment -- 4. Case Studies -- 5. Conclusions and Challenges -- References -- Chapter 3 Private Matching -- 1. Introduction -- 2. Problem Statement -- 3. Threat Models -- 4. Terminology and Assumptions -- 5. Techniques -- 6. Data Ownership Certificate (DOC) -- 7. Security Analysis -- 8. Cost Analysis -- 9. Related Work -- 10. Future Work -- References -- Chapter 4 Authentication Protocol Analysis -- I. Introduction -- 2. Modeling Computational Operations -- 3. Diffie-Hellman and Group Protocols -- 4. Deeper Models of Encryption -- 5. Decidable Formal Methods -- 6. Future Directions -- References -- Chapter 5 Self-certified Approach for Authenticated Key Agreement -- 1. Introduction -- 2. Proposed 2-PAKA Protocol -- 3. Proposed n-PAKA Protocol -- 4. Security Analysis -- 5. Conclusion -- References -- Part II P2P and Ad Hoc Networks -- Chapter 6 Experimenting with Admission Control in P2P Networks -- 1. Introduction -- 2. Background -- 3. Bouncer: Admission Control Toolkit -- 4. Integration with Peer Group Systems -- 5. Experiments -- 6. Discussion -- 7. Future Directions -- References -- Chapter 7 Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- 1. Introduction -- 2. Adaptive Random Pre-distribution Scheme -- 3. Uniquely Assigned One-way Hash Function Scheme -- 4. Evaluation -- 5. Conclusion -- References -- Part III Intrusion Detection, Defense, Measurement -- Chapter 8 Measuring Relative Attack Surfaces -- 1. Introduction -- 2. Terminology and Model -- 3. Dimensions of an Attack Surface -- 4. Security Bulletins -- 5. Analyzing Attack Surfaces -- 6. An Example Attack Surface Metric -- 7. Discussion of the RASQ Approach -- 8. Related Work -- 9. Future Work -- References -- Chapter 9 A Modeling of Intrusion Detection Systems with Identification Capability -- 1. Introduction -- 2. Traditional IDS model -- 3. A New model based on Identification (IDSIC) -- 4. Conclusion -- References -- Chapter 10 A Source-End Defense System against DDoS Attacks -- 1. Introduction -- 2. Review of D-WARD -- 3. Proposed System -- 4. Performance Evaluation -- 5. Conclusion and Future Work -- References -- Chapter 11 BEAGLE: Tracking System Failures for Reproducing Security Faults -- 1. Introduction -- 2. The Detection of Control State Corruption -- 3. The BEAGLE System Design and Implementation -- 4. Experiments and Assessment -- 5. Related Work -- 6. Conclusions -- References -- Part IV Multimedia Security -- Chapter 12 Web Application Security-Past, Present, and Futu -- 1. Introduction -- 2. Common Web Application Vulnerabilities -- 3. Current Countermeasures -- 4. Concluding Remarks and Future Work -- References -- Chapter 13 Securing JPEG2000 Code-Streams |
Summary |
Computer security has opened a variety of new frontiers in the new millennium. This book explores the spectrum of newly merging areas in security, in topics ranging over privacy, intellectual property protection, communications, operating system design, programming languages and security, and mobile security. It includes contributions from an international collection of both experienced and young researchers in computer security. The book will be useful to computer network security professionals and researchers |
Bibliography |
Includes bibliographical references and index |
Notes |
English |
|
Print version record |
In |
Springer e-books |
Subject |
Computer security
|
|
Computer Security
|
|
Data encryption (Computer science)
|
|
Data structures (Computer science)
|
|
Telecommunication.
|
|
Computer science.
|
|
Communications Engineering, Networks.
|
|
Computer Communication Networks.
|
|
Data Encryption.
|
|
Data structures.
|
|
Data Structures, Cryptology and Information Theory.
|
|
Informatique.
|
|
Computer security
|
Form |
Electronic book
|
Author |
Lee, D. T
|
|
Shieh, S. P., 1960-
|
|
Tygar, J. D
|
LC no. |
2005042554 |
ISBN |
0387240055 |
|
9780387240053 |
|
0387240063 |
|
9780387240060 |
|
1280234075 |
|
9781280234071 |
|
6610234078 |
|
9786610234073 |
|
1441936793 |
|
9781441936790 |
|