Secrecy, Covertness and Authentication in Wireless Communications, Shen
Автор: Shen Название: Secrecy, Covertness and Authentication in Wireless Communications ISBN: 3031384644 ISBN-13(EAN): 9783031384646 Издательство: Springer Рейтинг: Цена: 167700.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particular, this book covers three security aspects of wireless communications. It includes secrecy, i.e., preventing eavesdroppers from intercepting information from transmitted wireless signals, covertness, i.e., hiding the transmitted signals themselves from malicious wardens and authentication, i.e., authenticating the identities of communicating entities. When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming. Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book presents security-aware routing in wireless networks based on physical layer secure communication techniques. This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.
Автор: Furht, Borko , Kirovski, Darko Название: Multimedia Encryption and Authentication Techniques and Applications ISBN: 0367453630 ISBN-13(EAN): 9780367453633 Издательство: Taylor&Francis Рейтинг: Цена: 60220.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Providing a comprehensive reference on advanced topics in the field, this book addresses a variety of issues related to the protection of digital media content, including audio, image, and video protection. It presents state-of-the-art multimedia security technologies such as protection architectures, multimedia encryption, watermarking, fingerprin
Автор: Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mi Название: Authentication in IoT ISBN: 1119527929 ISBN-13(EAN): 9781119527923 Издательство: Wiley Рейтинг: Цена: 110830.00 T Наличие на складе: Невозможна поставка. Описание:
An up-to-date guide to an overview of authentication in the Internet of Things (IoT)
The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.
The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:
Offers an authoritative reference designed for use by all IoT stakeholders
Includes information for securing devices at the user, device, and network levels
Contains a classification of existing vulnerabilities
Written by an international group of experts on the topic
Provides a guide to the most current information available on IoT security
Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.
Автор: Ur-Rehman Название: Noise Tolerant Data Authentication for Wireless Communication ISBN: 3319789414 ISBN-13(EAN): 9783319789415 Издательство: Springer Рейтинг: Цена: 46570.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание:
Chapter1: Introduction and the Need for Noise Tolerant Data Authentication.- Chapter2: Wireless Communications.- Chapter3: Noise Tolerant Data Authentication Mechanisms.- Chapter4: Digital Watermarking Techniques.- Chapter5: Dual Watermarking with Error Correction.- Chapter6: Enhanced Decoding based on Authenticating the Region of Interests.- Chapter7: Authentication with Block Level Error Localization.
Автор: Saracino Название: Emerging Technologies for Authorization and Authentication ISBN: 303125466X ISBN-13(EAN): 9783031254666 Издательство: Springer Рейтинг: Цена: 51230.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022. The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions. They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.
Автор: Mayoral Fernando Название: Instant Java Password and Authentication Security ISBN: 1849697760 ISBN-13(EAN): 9781849697767 Издательство: Неизвестно Рейтинг: Цена: 36770.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Logics to reason formally about trust computation and manipulation.- An Authorization framework for Cooperate Intelligent Transport Systems.- A Framework for the Validation of Access Control Systems.- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC).- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication.- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics.- Collaborative Authentication using Threshold Cryptography.- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols.- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices.- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
Автор: Yu Название: WiFi signal-based user authentication ISBN: 9819959136 ISBN-13(EAN): 9789819959136 Издательство: Springer Рейтинг: Цена: 37260.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment. However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios. Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the key issues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.
Автор: Tijms Arjan, Bais Teo, Keil Werner Название: The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and M ISBN: 1484279441 ISBN-13(EAN): 9781484279441 Издательство: Springer Рейтинг: Цена: 60550.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Refer to this definitive and authoritative book to understand the Jakarta EE Security Spec, with Jakarta Authentication & Authorization as its underlying official foundation. Jakarta EE Security implementations are discussed, such as Soteria and Open Liberty, along with the build-in modules and Jakarta EE Security third-party modules, such as Payara Yubikey & OIDC, and OmniFaces JWT-Auth. The book discusses Jakarta EE Security in relation to SE underpinnings and provides a detailed explanation of how client-cert authentication over HTTPS takes place, how certifications work, and how LDAP-like names are mapped to caller/user names. General (web) security best practices are presented, such as not storing passwords in plaintext, using HTTPS, sanitizing inputs to DB queries, encoding output, and explanations of various (web) attacks and common vulnerabilities are included. Practical examples of securing applications discuss common needs such as letting users explicitly log in, sign up, verify email safely, explicitly log in to access protected pages, and go direct to the log in page. Common issues are covered such as abandoning an authentication dialog halfway and later accessing protected pages again. What You Will Learn * Know what Jakarta/Java EE security includes and how to get started learning and using this technology for today's and tomorrow's enterprise Java applications * Secure applications: traditional server-side web apps built with JSF (Faces) as well as applications based on client-side frameworks (such as Angular) and JAX-RS * Work with the daunting number of security APIs in Jakarta EE * Understand how EE security evolved Who This Book Is For Java developers using Jakarta EE and writing applications that need to be secured (every application). Basic knowledge of Servlets and CDI is assumed. Library writers and component providers who wish to provide additional authentication mechanisms for Jakarta EE also will find the book useful.
Автор: Mandal Jyotsna Kumar Название: Reversible Steganography and Authentication Via Transform Encoding ISBN: 9811543968 ISBN-13(EAN): 9789811543968 Издательство: Springer Рейтинг: Цена: 149060.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz