Security in Network Coding Security in Network Coding
Wireless Networks

Security in Network Coding

    • USD 89.99
    • USD 89.99

Descripción editorial

This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms leverage traditional cryptographic primitives and anonymous protocols, and are redesigned to fit into the new framework of network coding. These three mechanisms are MacSig, a new message authentication method for network-coded systems; P-Coding, a new encryption scheme to secure network-coding-based transmissions; and ANOC, a new anonymous routing protocol that seamlessly integrates anonymous routing with network coding. 
Along with these three mechanisms, the authors provide a review of network coding's benefits, applications, and security problems. Also included is a detailed overview of security issues in the field, with an explanation of how the security issues differ from those in traditional settings. While network coding can help improve network performance, the adoption of network coding can begreatly limited unless security and privacy threats are addressed. 
Designed for researchers and professionals, Security in Network Coding explores major challenges in network coding and offers practical solutions. Advanced-level students studying networking or system security will also find the content valuable.

GÉNERO
Informática e Internet
PUBLICADO
2016
26 de mayo
IDIOMA
EN
Inglés
EXTENSIÓN
109
Páginas
EDITORIAL
Springer International Publishing
VENDEDOR
Springer Nature B.V.
TAMAÑO
2.2
MB

Más libros de Peng Zhang & Chuang Lin

Microgrids Microgrids
2024
Underwater Wireless Power Transfer Underwater Wireless Power Transfer
2018
Time Series Analysis Methods and Applications for Flight Data Time Series Analysis Methods and Applications for Flight Data
2016
Information Retrieval Technology Information Retrieval Technology
2016
Data Science Data Science
2015
Lanthanide Single Molecule Magnets Lanthanide Single Molecule Magnets
2015

Otros libros de esta serie

Backdoor Attacks against Learning-Based Algorithms Backdoor Attacks against Learning-Based Algorithms
2024
Propagation Characterization and Channel Modeling for UAV Communications Propagation Characterization and Channel Modeling for UAV Communications
2024
Network Slicing for Future Wireless Communication Network Slicing for Future Wireless Communication
2024
Deception in Autonomous Transport Systems Deception in Autonomous Transport Systems
2024
MAC Protocol Design in Full-Duplex Enabled Wireless Networks MAC Protocol Design in Full-Duplex Enabled Wireless Networks
2024
Decentralized Privacy Preservation in Smart Cities Decentralized Privacy Preservation in Smart Cities
2024