Overview
- Editors:
-
-
Scott C.-H. Huang
-
, Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong/PR China
-
David MacCallum
-
, Computer Science and Engineering, University of Minnesota, Minneapolis, USA
-
Ding-Zhu Du
-
Erik Jonsson School of Engineering &, Computer Science, University of Texas, Dallas, Richardson, USA
- Contains the most current techniques and advances in network security
Access this book
Other ways to access
Table of contents (11 chapters)
-
-
- Carlo Blundo, Stelvio Cimato, Barbara Masucci
Pages 1-32
-
- Endre Bangerter, Jan Camenisch, Anna Lysyanskaya
Pages 33-56
-
- Sencun Zhu, Sushil Jajodia
Pages 57-75
-
- Markus Jakobsson, Filippo Menczer
Pages 77-95
-
- Xiaochun Cheng, Xiaoqi Ma, Scott C.-H. Huang, Maggie Cheng
Pages 97-115
-
- Mohammad O. Pervaiz, Mihaela Cardei, Jie Wu
Pages 117-142
-
- Ramkumar Chinchani, Duc Ha, Anusha Iyer, Hung Q. Ngo, Shambhu Upadhyaya
Pages 143-174
-
-
-
- Yi Gao, Willy Susilo, Yi Mu, Jennifer Seberry
Pages 229-249
-
- Kai Xing, Shyaam Sundhar Rajamadam Srinivasan, Major Jose “Manny” Rivera, Jiang Li, Xiuzhen Cheng
Pages 251-272
-
Back Matter
Pages 273-280
About this book
Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives. These changes also brought about new challenges, particularly in the area of security. Network security is essential to protect data integrity, con?d- tiality, access control, authentication, user privacy, and so on. All of these aspects are critical to provide fundamental network functionalities. This book covers a comprehensive array of topics in network security including secure metering, group key management, DDoS attacks, and many others. It can be used as a handy reference book for researchers, educators, graduate students, as well as professionals in the ?eld of network security. This book contains 11 r- ereed chapters from prominent researchers working in this area around the globe. Although these selected topics could not cover every aspect, they do represent the most fundamental and practical techniques. This book has been made possible by the great efforts and contributions of many people. First, we thank the authors of each chapter for contributing informative and insightful chapters. Then, we thank all reviewers for their invaluable comments and suggestions that improved the quality of this book. Finally, we thank the staff m- bers from Springer for publishing this work. Besides, we would like to dedicate this book to our families.
Editors and Affiliations
-
, Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong/PR China
Scott C.-H. Huang
-
, Computer Science and Engineering, University of Minnesota, Minneapolis, USA
David MacCallum
-
Erik Jonsson School of Engineering &, Computer Science, University of Texas, Dallas, Richardson, USA
Ding-Zhu Du