Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security in network coding
~
Lin, Chuang.
Security in network coding
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security in network codingby Peng Zhang, Chuang Lin.
Author:
Zhang, Peng.
other author:
Lin, Chuang.
Published:
Cham :Springer International Publishing :2016.
Description:
xi, 98 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer networksSecurity measures.
Online resource:
http://dx.doi.org/10.1007/978-3-319-31083-1
ISBN:
9783319310831$q(electronic bk.)
Security in network coding
Zhang, Peng.
Security in network coding
[electronic resource] /by Peng Zhang, Chuang Lin. - Cham :Springer International Publishing :2016. - xi, 98 p. :ill. (some col.), digital ;24 cm. - Wireless networks,2366-1186. - Wireless networks..
Introduction -- Security Threats in Network Coding -- Subspace Authentication for Random Linear Network Coding -- Lightweight Encryption for Random Linear Network Coding -- Anonymous Routing for Wireless Network Coding -- Concluding Remarks and Future Directions.
This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms leverage traditional cryptographic primitives and anonymous protocols, and are redesigned to fit into the new framework of network coding. These three mechanisms are MacSig, a new message authentication method for network-coded systems; P-Coding, a new encryption scheme to secure network-coding-based transmissions; and ANOC, a new anonymous routing protocol that seamlessly integrates anonymous routing with network coding. Along with these three mechanisms, the authors provide a review of network coding's benefits, applications, and security problems. Also included is a detailed overview of security issues in the field, with an explanation of how the security issues differ from those in traditional settings. While network coding can help improve network performance, the adoption of network coding can be greatly limited unless security and privacy threats are addressed. Designed for researchers and professionals, Security in Network Coding explores major challenges in network coding and offers practical solutions. Advanced-level students studying networking or system security will also find the content valuable.
ISBN: 9783319310831$q(electronic bk.)
Standard No.: 10.1007/978-3-319-31083-1doiSubjects--Topical Terms:
185597
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Security in network coding
LDR
:02531nmm a2200337 a 4500
001
489096
003
DE-He213
005
20161021110609.0
006
m d
007
cr nn 008maaau
008
161213s2016 gw s 0 eng d
020
$a
9783319310831$q(electronic bk.)
020
$a
9783319310824$q(paper)
024
7
$a
10.1007/978-3-319-31083-1
$2
doi
035
$a
978-3-319-31083-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.Z63 2016
100
1
$a
Zhang, Peng.
$3
531103
245
1 0
$a
Security in network coding
$h
[electronic resource] /
$c
by Peng Zhang, Chuang Lin.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
xi, 98 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Wireless networks,
$x
2366-1186
505
0
$a
Introduction -- Security Threats in Network Coding -- Subspace Authentication for Random Linear Network Coding -- Lightweight Encryption for Random Linear Network Coding -- Anonymous Routing for Wireless Network Coding -- Concluding Remarks and Future Directions.
520
$a
This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms leverage traditional cryptographic primitives and anonymous protocols, and are redesigned to fit into the new framework of network coding. These three mechanisms are MacSig, a new message authentication method for network-coded systems; P-Coding, a new encryption scheme to secure network-coding-based transmissions; and ANOC, a new anonymous routing protocol that seamlessly integrates anonymous routing with network coding. Along with these three mechanisms, the authors provide a review of network coding's benefits, applications, and security problems. Also included is a detailed overview of security issues in the field, with an explanation of how the security issues differ from those in traditional settings. While network coding can help improve network performance, the adoption of network coding can be greatly limited unless security and privacy threats are addressed. Designed for researchers and professionals, Security in Network Coding explores major challenges in network coding and offers practical solutions. Advanced-level students studying networking or system security will also find the content valuable.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Communications Engineering, Networks.
$3
273745
700
1
$a
Lin, Chuang.
$3
719295
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Wireless networks.
$3
731203
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-31083-1
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000126607
電子館藏
1圖書
電子書
EB TK5105.59 Z63 2016
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-31083-1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login