close
1.

電子ブック

EB
International Conference on Information Systems Security, Sushil Jajodia, Takeo Kanade, Chandan Mazumdar
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
2.

電子ブック

EB
Douglas W. Frye, Sushil Jajodia
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Table of Contents
List of Figures
Preface
Acknowledgments and Dedication
Information Technology and its Role In the Modern Organization / Chapter 1:
The Extent of an Organization's Connectivity / Chapter 2:
Network Physical Components / Chapter 3:
Legitimate Network Access / Chapter 4:
Illegitimate Network Access / Chapter 5:
Encryption / Chapter 6:
Balanced Scorecard / Chapter 7:
Sarbanes-Oxley / Chapter 8:
Physical Security / Chapter 9:
Disaster Recovery / Chapter 10:
Initial Employee Communication / Chapter 11:
The Human Element / Chapter 12:
Email, Instant Messaging and Phishing / Chapter 13:
Network Administration / Chapter 14:
Network Monitoring / Chapter 15:
Executive Communication / Chapter 16:
Information Security Awareness / Chapter 17:
Synthesis and Conclusion / Chapter 18:
Draft Policies / Chapter 19:
Bibliography
Index
Table of Contents
List of Figures
Preface
3.

電子ブック

EB
Donggang Liu, Sushil Jajodia, Peng Ning
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Wireless Sensor Network / 1.1:
Design Challenges / 1.2:
Security Issues in Sensor Networks / 1.3:
Broadcast Authentication / 1.3.1:
Pairwise Key Establishment / 1.3.2:
Security in Localization / 1.3.3:
Orgnization of the Book / 1.4:
[mu]TESLA Broadcast Authentication / 2:
Multi-Level [mu]TESLA / 2.2:
Scheme I: Predetermined Key Chain Commitment / 2.2.1:
Scheme II: Naive Two-Level [mu]TESLA / 2.2.2:
Scheme III: Fault Tolerant Two-Level [mu]TESLA / 2.2.3:
Scheme IV: DOS-Tolerant Two-Level [mu]TESLA / 2.2.4:
Scheme V: DOS-Resistant Two-Level [mu]TESLA / 2.2.5:
Scheme VI: Multi-Level [mu]TESLA / 2.2.6:
Experimental Results / 2.2.7:
Tree-Based [mu]TESLA / 2.3:
The Basic Approach / 2.3.1:
A Scheme for Long-Lived Senders / 2.3.2:
Distributing Parameter Certificates / 2.3.3:
Revoking [mu]TESLA Instances / 2.3.4:
Implementation and Evaluation / 2.3.5:
Summary / 2.4:
Key Pre-Distribution Techniques in Sensor Networks / 3:
Polynomial-Based Key Pre-Distribution / 3.1.1:
Probabilistic Key Pre-Distribution / 3.1.2:
Polynomial Pool-Based Key Pre-Distribution / 3.2:
Phase 1: Setup / 3.2.1:
Phase 2: Direct Key Establishment / 3.2.2:
Phase 3: Path Key Establishment / 3.2.3:
Key Pre-Distribution Using Random Subset Assignment / 3.3:
The Random Subset Assignment Scheme / 3.3.1:
Performance / 3.3.2:
Overheads / 3.3.3:
Security Analysis / 3.3.4:
Comparison with Previous Schemes / 3.3.5:
Hypercube-based Key Pre-Distribution / 3.4:
The Hypercube-Based Scheme / 3.4.1:
Dynamic Key Path Discovery / 3.4.2:
Overhead / 3.4.3:
Optimization of Polynomial Evaluation / 3.4.5:
Evaluation / 3.5.2:
Improving Pairwise Key Establishment Using Deployment Knowledge / 3.6:
Improving Key Pre-Distribution with Prior Deployment Knowledge / 4.1:
A Location-Aware Deployment Model / 4.1.1:
Closest Pairwise Keys Scheme / 4.1.2:
Closest Polynomials Pre-Distribution Scheme / 4.1.3:
Improving Key Pre-Distribution with Post Deployment Knowledge / 4.2:
Key Prioritization Using Post Deployment Knowledge / 4.2.1:
Improving Random Subset Assignment Scheme with Deployment Locations / 4.2.2:
Improving Key Pre-Distribution with Group Deployment Knowledge / 4.3:
Group-Based Deployment Model / 4.3.1:
A General Framework / 4.3.2:
Performance Analysis / 4.3.3:
Secure Localization / 4.3.4:
Localization in Sensor Networks / 5.1:
Pitfalls of Current Localization Schemes under Attacks / 5.2:
Attack-Resistant Location Estimation / 5.3:
Assumptions / 5.3.1:
Attack-Resistant Minimum Mean Square Estimation (MMSE) / 5.3.2:
Voting-Based Location Estimation / 5.3.3:
Simulation Evaluation / 5.3.4:
Implementation and Field Experiments / 5.3.6:
A Detector for Malicious Beacon Nodes / 5.4:
Detecting Malicious Beacon Signals / 5.4.1:
Filtering Replayed Beacon Signals / 5.4.2:
Revoking Malicious Beacon Nodes / 5.4.3:
Summary and Future Work / 5.4.4:
Future Work / 6.1:
References
Index
Introduction / 1:
Wireless Sensor Network / 1.1:
Design Challenges / 1.2:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼