| 000 | 02972nam a22005055i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-22971-3 | ||
| 003 | DE-He213 | ||
| 005 | 20250710083926.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2005 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387229713 _a99780387229713 |
||
| 024 | 7 |
_a10.1007/b100182 _2doi |
|
| 082 | 0 | 4 |
_a005.74 _223 |
| 100 | 1 |
_aZou, Xukai. _eauthor. |
|
| 245 | 1 | 0 |
_aSecure Group Communications over Data Networks _h[recurso electrónico] / _cby Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras. |
| 264 | 1 |
_aNew York, NY : _bSpringer New York, _c2005. |
|
| 300 |
_aXIX, 172 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aTypical Group Key Management Schemes -- Tree Based Key Management Schemes -- Dynamic Conferencing Schemes -- Secure Group Communications with Hierarchical Access Control -- SGC Challenges and SGC for Wireless Networks -- Concluding Remarks. | |
| 520 | _aThis book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over data networks. It offers an overview of secure algorithms and protocols for group communication linking areas such as applied cryptography and computer networking. Also included is a coverage of challenges in deploying secure group communication-based applications over wireless networks. These challenges include the limited computational power of mobile devices, susceptibility of wireless networks to intrusion and unauthorized access and mobility of nodes in a wireless ad-hoc network environment. Secure Group Communications over Data Networks provides a wealth of information for network architects, IT Professionals, computer scientists, and advanced students of computer science and computer engineering in the fields of networking, computer security and software applications development. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aCOMPUTER NETWORK ARCHITECTURES. | |
| 650 | 0 | _aCOMPUTER COMMUNICATION NETWORKS. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aTELECOMMUNICATION. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aCOMPUTER COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aCOMMUNICATIONS ENGINEERING, NETWORKS. |
| 700 | 1 |
_aRamamurthy, Byrav. _eauthor. |
|
| 700 | 1 |
_aMagliveras, Spyros S. _eauthor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387229706 |
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/b100182 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c56121 _d56121 |
||