Show simple item record

dc.contributor.authorXiao, Yang
dc.date.accessioned2020-09-21T13:16:32Z
dc.date.available2020-09-21T13:16:32Z
dc.date.issued2007
dc.identifierONIX_20200921_9780849379253_6
dc.identifierOCN: 815543431
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/41646
dc.description.abstractThis book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.
dc.languageEnglish
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UB Information technology: general topicsen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UT Computer networking and communicationsen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer securityen_US
dc.subject.classificationthema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TH Energy technology and engineering::THR Electrical engineeringen_US
dc.subject.classificationthema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJK Communications engineering / telecommunications::TJKT Telephone technology::TJKT1 Mobile phone technologyen_US
dc.subject.otherIT Security
dc.subject.otherNetworks
dc.subject.otherDigital and Wireless Communication
dc.subject.otherENG
dc.subject.otherInfoSECURITY
dc.subject.otherElectricalEngineering
dc.subject.otherSCI-TECH
dc.subject.otherITECH
dc.subject.otherINFORMATIONSCIENCE
dc.subject.otherSTM
dc.subject.otheraccess
dc.subject.otherbased
dc.subject.othercontrol
dc.subject.otherhoc
dc.subject.othernetworks
dc.subject.otherprotocol
dc.subject.otherrole
dc.subject.otherrouting
dc.subject.othersensor
dc.subject.otherwireless
dc.titleSecurity in Distributed, Grid, Mobile, and Pervasive Computing
dc.typebook
oapen.identifier.doi10.1201/9780849379253
oapen.relation.isPublishedBy7b3c7b10-5b1e-40b3-860e-c6dd5197f0bb
oapen.imprintAuerbach Publications
oapen.pages440
peerreview.anonymitySingle-anonymised
peerreview.idbc80075c-96cc-4740-a9f3-a234bc2598f1
peerreview.open.reviewNo
peerreview.publish.responsibilityPublisher
peerreview.review.stagePre-publication
peerreview.review.typeProposal
peerreview.reviewer.typeInternal editor
peerreview.reviewer.typeExternal peer reviewer
peerreview.titleProposal review
oapen.review.commentsTaylor & Francis open access titles are reviewed as a minimum at proposal stage by at least two external peer reviewers and an internal editor (additional reviews may be sought and additional content reviewed as required).


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record