Adrian Perrig - Böcker
Visar alla böcker från författaren Adrian Perrig. Handla med fri frakt och snabb leverans.
9 produkter
9 produkter
1 105 kr
Skickas inom 10-15 vardagar
This work presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks and satellite broadcast. The book presents and compares techniques for basic operations including: key distribution for access control; source authentication of transmissions; and non-repudiation of streams. It discusses how to realize these operations both with high performance processors and resource constrained processors, and shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. The book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
1 105 kr
Skickas inom 10-15 vardagar
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
556 kr
Skickas inom 10-15 vardagar
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.
1 434 kr
Skickas inom 10-15 vardagar
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment.On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network.This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system:Describes the principles that guided SCION's design as a secure and robust Internet architectureProvides a comprehensive description of the next evolution in the way data finds its way through the InternetExplains how SCION can contribute to reducing carbon emissions, by introducing SCION Green NetworkingDemonstrates how SCION not only functions in academic settings but also works in production deploymentsDiscusses additional use cases for driving SCION's adoptionPresents the approaches for formal verification of protocols and codeIllustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.
995 kr
Skickas inom 10-15 vardagar
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment.On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network.This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system:Describes the principles that guided SCION's design as a secure and robust Internet architectureProvides a comprehensive description of the next evolution in the way data finds its way through the InternetExplains how SCION can contribute to reducing carbon emissions, by introducing SCION Green NetworkingDemonstrates how SCION not only functions in academic settings but also works in production deploymentsDiscusses additional use cases for driving SCION's adoptionPresents the approaches for formal verification of protocols and codeIllustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.
Del 8267 - Lecture Notes in Computer Science
Information Security Applications
14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
Häftad, Engelska, 2014
556 kr
Skickas inom 10-15 vardagar
This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.
553 kr
Skickas inom 10-15 vardagar
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability.
556 kr
Skickas inom 10-15 vardagar
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability.
Trust and Trustworthy Computing
4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings
Häftad, Engelska, 2011
556 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.The 23 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in technical sessions on cloud and virtualization, physically unclonable functions, mobile device security, socio-economic aspects of trust, hardware trust, access control, privacy, trust aspects of routing, and cryptophysical protocols.