menu
{ "item_title" : "Secure Broadcast Communication", "item_author" : [" Adrian Perrig", "J. D. Tygar "], "item_description" : "Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study. ", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/1/46/134/976/1461349761_b.jpg", "price_data" : { "retail_price" : "109.99", "online_price" : "109.99", "our_price" : "109.99", "club_price" : "109.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Secure Broadcast Communication|Adrian Perrig

Secure Broadcast Communication : In Wired and Wireless Networks

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

This item is Non-Returnable

Details

  • ISBN-13: 9781461349761
  • ISBN-10: 1461349761
  • Publisher: Springer
  • Publish Date: October 2012
  • Dimensions: 9.21 x 6.14 x 0.51 inches
  • Shipping Weight: 0.75 pounds
  • Page Count: 214

Related Categories

You May Also Like...

    1

BAM Customer Reviews