Security, Privacy and Reliability in Computer Communications and Networks

Security, Privacy and Reliability in Computer Communications and Networks
  • eBook:
    Security, Privacy and Reliability in Computer Communications and Networks
  • Author:
    Kewei Sha, Aaron Striegel, Min Song
  • Edition:
  • Categories:
  • Data:
    February 9, 2017
  • ISBN:
  • ISBN-13:
  • Language:
  • Pages:
    200 pages
  • Format:

Book Description
Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability. 

Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols. 

Technical topics discussed in the book include: 
* Vulnerabilities and Intrusion Detection
* Cryptographic Algorithms and Evaluation
* Privacy 
* Reliable Routing Protocols

This book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, cyber security, information insurance and telecommunication systems.


PART I: Privacy
1. Distributed Beamforming Relay Selection to Increase Base Station Anonymity inWireless Ad Hoc Networks
2. A Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication

PART II: Vulnerabilities, Detection and Monitoring
3. DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection
4. Detection of Service Level Agreement (SLA) Violations in Memory Management in Virtual Machines
5. Analysis of Mobile Threats and Security Vulnerabilities for Mobile Platforms and Devices

PART III: Cryptographic Algorithms
6. Quasigroup-Based Encryption for Low-Powered Devices
7. Measuring Interpretation and Evaluation of Client-side Encryption Tools in Cloud Computing
8. Kolmogorov–Smirnov Test-based Side-channel Distinguishers: Constructions, Analysis, and Implementations
9. Multi-antenna Transmission Technique with Constellation Shaping for Secrecy at Physical Layer

PART VI: Reliable System Design
10. Active Sub-Areas-Based Multi-Copy Routing in VDTNs
11. RobustGeo: A Disruption-Tolerant Geo-Routing Protocol
12. Social Similarity-based Multicast Framework in Opportunistic Mobile Social Networks
13. Ensuring QoS for IEEE 802.11 Real-Time Communications Using an AIFSN Prediction Scheme

Free sample

Add comments
Введите код с картинки:*
Кликните на изображение чтобы обновить код, если он неразборчив
Copyright © 2019