LEADER 02790oam 2200529 450 001 9910298567003321 005 20190911103512.0 010 $a1-4614-7831-6 024 7 $a10.1007/978-1-4614-7831-7 035 $a(OCoLC)856582758 035 $a(MiFhGG)GVRL6VKX 035 $a(EXLCZ)992670000000420532 100 $a20130605d2014 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aDynamic secrets in communication security /$fSheng Xiao, Weibo Gong, Don Towsley 210 $aNew York $cSpringer Science$d2014 210 1$aNew York :$cSpringer,$d2014. 215 $a1 online resource (xi, 136 pages) $cillustrations (some color) 225 0 $aGale eBooks 300 $aDescription based upon print version of record. 311 $a1-4614-7830-8 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Communication Security and Key Safety -- Dynamic Secrets -- Dynamic Wireless Security -- Dynamic Key Management in a Smart Grid -- Secrecy in Communications -- Reliability Analysis for Communication Security -- Future Applications. 330 $aDynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user?s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering. 606 $aComputer security 606 $aData encryption (Computer science) 606 $aCryptography 615 0$aComputer security. 615 0$aData encryption (Computer science) 615 0$aCryptography. 676 $a004 676 $a004.6 676 $a005.74 676 $a005.8 700 $aXiao$b Sheng$0979427 702 $aGong$b Weibo 702 $aTowsley$b Don 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910298567003321 996 $aDynamic secrets in communication security$92232958 997 $aUNINA