LEADER 04146nam 2200637Ia 450 001 9910784839003321 005 20230721031002.0 010 $a1-281-91899-7 010 $a9786611918996 010 $a981-277-010-0 035 $a(CKB)1000000000406723 035 $a(EBL)1193126 035 $a(SSID)ssj0000350366 035 $a(PQKBManifestationID)12070751 035 $a(PQKBTitleCode)TC0000350366 035 $a(PQKBWorkID)10355817 035 $a(PQKB)11436404 035 $a(MiAaPQ)EBC1193126 035 $a(WSP)00006513 035 $a(Au-PeEL)EBL1193126 035 $a(CaPaEBR)ebr10698893 035 $a(CaONFJC)MIL191899 035 $a(OCoLC)829713529 035 $a(EXLCZ)991000000000406723 100 $a20100617d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSecurity in distributed and networking systems$b[electronic resource] /$feditors, Yang Xiao, Yi Pan 210 $aHackensack, NJ $cWorld Scientific$dc2007 215 $a1 online resource (512 p.) 225 1 $aComputer and network security ;$vv. 1 300 $aDescription based upon print version of record. 311 $a981-270-807-3 320 $aIncludes bibliographical references. 327 $apt. 1. Security in internet. ch. 1. Security issues in the TCP/IP suite. ch. 2. New internet threates: an overview of spa, email and spyware. ch. 3. Securing multimedia and VoIP Content with secure real-time transport protocol -- pt. 2. Security in distributed systems. ch. 4. Cover-free families and their applications. ch. 5. Group rekeying in multi-privileged group communications for distributed networking services. ch. 6. Access control policy negotiation for remote hot-deployed grid servoces -- pt. 3. Security in pervasive computing. ch. 7. Low-cost radio frequency identification security. ch. 8. Energy consumption of key distribution in 802.15.4 beacon enabled cluster with sleep management. ch. 9. Security wireless networks using device type identification -- pt. 4. Security in sensor networks. ch. 10. Secuity in distributed sensor network time synchronization services. ch. 11. Key management in wireless sensor networks. ch. 12. Secure network programming in wireless sensor networks -- pt. 5. Secutoy in ad hoc networks. ch. 13. Bootstrapping security in mobile ad hoc networks using identity-based schemes. ch. 14. Hash-Binary-Tree based group key distribution with time-limited node revocation. ch. 15. Efficient authentication schemes for AODV and DSR -- pt. 6. Security in wireless networks. ch. 16. Security in wireless local area networks. ch. 17. Access security in heterogenous wireless networls. ch. 18. Authentication in wireless cellular networks. 330 $aSecurity issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy 410 0$aComputer and network security ;$vv. 1. 606 $aComputer networks$xSecurity measures 606 $aDistributed operating systems (Computers)$xSecurity measures 606 $aElectronic data processing$xDistributed processing 615 0$aComputer networks$xSecurity measures. 615 0$aDistributed operating systems (Computers)$xSecurity measures. 615 0$aElectronic data processing$xDistributed processing. 676 $a005.44 701 $aPan$b Yi$f1960-$0895857 701 $aXiao$b Yang$f1966-$0875841 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784839003321 996 $aSecurity in distributed and networking systems$93681668 997 $aUNINA