Architectures and protocols for secu...
IGI Global.

 

  • Architectures and protocols for secure information technology infrastructures
  • Record Type: Language materials, printed : monographic
    Secondary Intellectual Responsibility: GarciaFernando Pereniguez, 1984-
    Secondary Intellectual Responsibility: Marin-LopezRafael, 1977-
    Secondary Intellectual Responsibility: MartinezAntonio Ruiz, 1976-
    Secondary Intellectual Responsibility: IGI Global.
    Description: PDFs (365 pages)illustrations. :
    Subject: Computer networks - Security measures. -
    Subject: Information technology - Security measures. -
    Subject: Access control
    Subject: Anonymous communications and services
    Subject: Content distribution
    Subject: Mobile/Embedded systems
    Subject: RFID
    Subject: Secure protocols
    Subject: Security architectures
    Subject: Security modeling and vulnerability analysis
    Online resource: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4514-1
    Notes: Content Type: text
    Summary: "This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"--Provided by publisher.
    ISBN: 9781466645158
    Content Note: Security and privacy issues in cloud computing / Jaydip Sen Towards a certified electronic mail system / Gerard Draper-Gil, Josep-Lluis Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber Mobile IPv6: mobility management and security aspects / Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel A new encryption algorithm based on chaotic map for wireless sensor network / Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet A polling booth-based electronic voting scheme / Md. Abdul Based Challenges and solutions for DNS security in IPv6 / Hosnieh Rafiee, Martin von Löwis, Christoph Meinel Host-based intrusion detection systems: architectures, solutions, and challenges / Vit Bukac, Vashek Matyaš Enhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm / Yuxin Meng, Lam-For Kwok Towards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches / Ciprian Pungila, Viorel Negru A mobile-based attribute aggregation architecture for user-centric identity management / Alexandre B. Augusto, Manuel E. Correia The Austrian identity ecosystem: an e-government experience / Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project / Andrea Atzeni, John Lyle, Shamal Faily Securing XML with role-based access control: case study in health care / Alberto De la Rosa Algarin, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sanchez, Robert Kuykendall.
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login