Cover image for Security in distributed and networking systems
Security in distributed and networking systems
Title:
Security in distributed and networking systems
Author:
Xiao, Yang, 1966-
ISBN:
9789812708076
Publication Information:
Singapore ; Hackensack, NJ : World Scientific, c2007.
Physical Description:
xvi, 493 p. : ill., col. ports. ; 24 cm.
Series:
Computer and network security ; v. 1
Series Title:
Computer and network security ; v. 1
Contents:
Ch. 1. Security Issues in the TCP/IP Suite / Prabhaker Mateti -- Ch. 2. New Internet Threats: An Overview of Spam Email and Spyware / Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo -- Ch. 3. Securing Multimedia and VoIP Content with the Secure Real-time Transport Protocol / Michael Oehler -- Ch. 4. Cover-Free Families and Their Applications / San Ling, Huaxiong Wang and Chaoping Xing -- Ch. 5. Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services / Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen and Minyi Guo -- Ch. 6. Access Control Policy Negotiation for Remote Hot-Deployed Grid Services / Jinpeng Huai, Wei Xue, Yunhao Liu and Lionel M. Ni -- Ch. 7. Low-Cost Radio Frequency Identification Security / Yang Xiao, Larissa Klimpel, Kaveh Ghaboosi and Jingyuan Zhang -- Ch. 8. Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management / Jelena Misic -- Ch. 9. Securing Wireless Networks Using Device Type Identification / Cherita Corbett, Raheem Beyah and John Copeland -- Ch. 10. Security in Distributed Sensor Network Time Synchronization Services / Fei Hu, Ramesh Vaithiyam Krishnaram and Sunil Kumar -- Ch. 11. Key Management in Wireless Sensor Networks / Yu-Kwong Kwok -- Ch. 12. Secure Network Programming in Wireless Sensor Networks / Tassos Dimitriou and Ioannis Krontiris -- Ch. 13. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes / Katrin Hoeper and Guang Gong -- Ch. 14. Hash-Binary-Tree Based Group Key Distribution with Time-limited Node Revocation / Yixin Jiang, Chuang Lin, Minghui Shi and Xuemin (Sherman) Shen -- Ch. 15. Efficient Authentication Schemes for AODV and DSR / Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen and Fangguo Zhang -- Ch. 16. Security in Wireless Local Area Networks / Mohammad O. Pervaiz, Mihaela Cardei and Jie Wu -- Ch. 17. Access Security in Heterogeneous Wireless Networks / Ali Al Shidhani and Victor C. M. Leung -- Ch. 18. Authentication in Wireless Cellular Networks / Frank H. Li, Marcus Barkey, Yang Xiao and Lilian P. Kalyanapu.
Copies: