Authors:
- Presents unique security properties and application studies for dynamic secrets
- Compares dynamic secrets with conventional forms of secrets such as passwords and cryptographic keys using theoretical analysis and daily life analogies
- Includes a case study on wireless medical devices and smart grid communications as examples for the practicality of dynamic secrets
- Includes supplementary material: sn.pub/extras
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (8 chapters)
-
Front Matter
-
Back Matter
About this book
Reviews
From the reviews:
“It is based on the doctoral dissertation … completed by Sheng Xiao of the University of Massachusetts, Amherst, in the year 2013, under the guidance of Weibo Gong and Don Towsley. The work is intended for sophisticated students of computer science as well as electrical engineering. It is also meant for research workers and practitioners involved in network security and/or wireless communications. … The topics in the book are interesting. … I recommend the book for security enthusiasts.” (S. V. Nagaraj, Computing Reviews, April, 2014)
Authors and Affiliations
-
College of Information Science and Engineering, Hunan University, Changsha, China, People's Republic
Sheng Xiao
-
Electrical and Computer Engineering, University of Massachusetts Amherst, Amherst, USA
Weibo Gong, Don Towsley
Bibliographic Information
Book Title: Dynamic Secrets in Communication Security
Authors: Sheng Xiao, Weibo Gong, Don Towsley
DOI: https://doi.org/10.1007/978-1-4614-7831-7
Publisher: Springer New York, NY
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Science+Business Media New York 2014
Hardcover ISBN: 978-1-4614-7830-0
Softcover ISBN: 978-1-4939-0229-3
eBook ISBN: 978-1-4614-7831-7
Edition Number: 1
Number of Pages: XI, 136
Topics: Systems and Data Security, Computer Communication Networks, Cryptology, Data Structures and Information Theory, Communications Engineering, Networks