2010

Network Security

Editors:

ISBN: 978-0-387-73820-8 (Print) 978-0-387-73821-5 (Online)

Table of contents (11 chapters)

  1. Front Matter

    Pages i-xi

  2. No Access

    Book Chapter

    Pages 1-32

    Secure Metering Schemes

  3. No Access

    Book Chapter

    Pages 33-56

    A Cryptographic Framework for the Controlled Release Of Certified Data

  4. No Access

    Book Chapter

    Pages 57-75

    Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions

  5. No Access

    Book Chapter

    Pages 77-95

    Web Forms and Untraceable DDoS Attacks

  6. No Access

    Book Chapter

    Pages 97-115

    Mechanical Verification of Cryptographic Protocols

  7. No Access

    Book Chapter

    Pages 117-142

    Routing Security in Ad Hoc Wireless Networks

  8. No Access

    Book Chapter

    Pages 143-174

    Insider Threat Assessment: Model, Analysis and Tool

  9. No Access

    Book Chapter

    Pages 175-205

    Toward Automated Intrusion Alert Analysis

  10. No Access

    Book Chapter

    Pages 207-227

    Conventional Cryptographic Primitives

  11. No Access

    Book Chapter

    Pages 229-249

    Efficient Trapdoor-Based Client Puzzle Against DoS Attacks

  12. No Access

    Book Chapter

    Pages 251-272

    Attacks and Countermeasures in Sensor Networks: A Survey

  13. Back Matter

    Pages 273-280