Amazon cover image
Image from Amazon.com

Security in distributed, grid, mobile, and pervasive computing / Yang Xiao.

By: Material type: TextTextPublisher: Boca Raton : Auerbach Publications, [2007]Copyright date: ©2007Description: 1 online resource (420 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780849379253
  • 0849379253
  • 9781466526440
  • 1466526440
Subject(s): Genre/Form: Additional physical formats: Print version:: Security in distributed, grid, mobile, and pervasive computing.DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 X53 2007eb
Online resources:
Contents:
Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks -- Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks.
Summary: Focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. Presenting strategies for security issues, this book reviews security issues and challenges in content distribution networks, and also describes key agreement protocols based on the Diffie-Hellman key exchange.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

Print version record.

Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks -- Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks.

Focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. Presenting strategies for security issues, this book reviews security issues and challenges in content distribution networks, and also describes key agreement protocols based on the Diffie-Hellman key exchange.

Open Access EbpS

WorldCat record variable field(s) change: 650

There are no comments on this title.

to post a comment.