Skip to main content
  • Book
  • © 2005

Computer Security in the 21st Century

  • Addresses new computer security issues for the 21st century

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 chapters)

  1. Front Matter

    Pages i-xi
  2. Introduction

    • D. T. Lee, S. P. Shieh, J. D. Tygar
    Pages 1-3
  3. Security Protocol Design

    1. Challenges in Protocol Design and Analysis

      • Dieter Gollmann
      Pages 7-24
    2. Private Matching

      • Yaping Li, J. D. Tygar, Joseph M. Hellerstein
      Pages 25-50
    3. Authentication Protocol Analysis

      • Jonathan Millen
      Pages 51-60
    4. Self-Certified Approach for Authenticated Key Agreement

      • Tzong-Chen Wu, Yen-Ching Lin
      Pages 61-67
  4. P2P and Ad Hoc Networks

    1. Experimenting with Admission Control in P2P Networks

      • Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
      Pages 71-89
    2. Adaptive Random Key Distribution Schemes for Wireless Sensor Networks

      • Shih-I Huang, Shiuhpyng Shieh, S.Y. Wu
      Pages 91-105
  5. Intrusion Detection, Defense, Measurement

    1. Measuring Relative Attack Surfaces

      • Michael Howard, Jon Pincus, Jeannette M. Wing
      Pages 109-137
    2. A Modeling of Intrusion Detection Systems with Identification Capability

      • Pei-Te Chen, Benjamin Tseng, Chi-Sung Laih
      Pages 139-145
    3. A Source-End Defense System Against DDoS Attacks

      • Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh, Sheng-Hsuan Wang
      Pages 147-168
    4. Beagle: Tracking System Failures for Reproducing Security Faults

      • Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, Deron Liang
      Pages 169-180
  6. Multimedia Security

    1. Web Application Security—Past, Present, and Future

      • Yao-Wen Huang, D. T. Lee
      Pages 183-227
    2. Securing JPEG2000 Code-Streams

      • Robert H. Deng, Yongdong Wu, Di Ma
      Pages 229-253
    3. A Secret Information Hiding Scheme Based on Switching Tree Coding

      • Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu
      Pages 255-263
  7. Back Matter

    Pages 265-268

About this book

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of :

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

Editors and Affiliations

  • Academia Sinica, Taiwan

    D. T. Lee

  • National Chiao Tung University, Taiwan

    S. P. Shieh

  • UC Berkeley, USA

    J. D. Tygar

About the editors

Computer Security in the 21st Century

Edited by D.T. Lee, S.P. Shieh, and J.D. Tygar

 

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: secure security protocol design, secure peer-to-peer P2P and ad hoc networks Ad Hoc Networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of:

* Fundamental new security

* Cryptographic protocols and design,

* A new way of measuring network vulnerability: attack surfaces,

* Network vulnerability and building impenetrable systems,

* Multimedia content protection including a new standard for photographic images, JPEG2000.

 

Researchers and computer security developers will find in this volume book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

 

ABOUT THE AUTHORS

D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security.

 

S. P.hiuh-Pyng Shieh is a Professor in the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems.

 

J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department’s Study Group on Security with Privacy. Heworks in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management.

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access