Multicast and group security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston
Artech House
©2003
|
Schriftenreihe: | Artech House computer security series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Framework for multicast and group security -- Multicast data authentication -- Introduction to group key management -- Architectures and protocols for group key management -- Group key management algorithms -- Group security policy -- Securing multicast routing protocols -- Security in Reliable Multicast protocols -- Applications of multicast and their security -- Conclusion and future work A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication |
Beschreibung: | 1 Online-Ressource (xxii, 307 pages) |
ISBN: | 1580533426 158053659X 9781580536592 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043100405 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2003 |||| o||u| ||||||eng d | ||
020 | |a 1580533426 |9 1-58053-342-6 | ||
020 | |a 158053659X |9 1-58053-659-X | ||
020 | |a 9781580536592 |9 978-1-58053-659-2 | ||
035 | |a (OCoLC)53004789 | ||
035 | |a (DE-599)BVBBV043100405 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Hardjono, Thomas |e Verfasser |4 aut | |
245 | 1 | 0 | |a Multicast and group security |c Thomas Hardjono, Lakshminath R. Dondeti |
264 | 1 | |a Boston |b Artech House |c ©2003 | |
300 | |a 1 Online-Ressource (xxii, 307 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House computer security series | |
500 | |a Includes bibliographical references and index | ||
500 | |a Framework for multicast and group security -- Multicast data authentication -- Introduction to group key management -- Architectures and protocols for group key management -- Group key management algorithms -- Group security policy -- Securing multicast routing protocols -- Security in Reliable Multicast protocols -- Applications of multicast and their security -- Conclusion and future work | ||
500 | |a A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Multicasting (Computer networks) |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Dondeti, Lakshminath R. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87726 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028524596 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87726 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87726 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175509818441728 |
---|---|
any_adam_object | |
author | Hardjono, Thomas |
author_facet | Hardjono, Thomas |
author_role | aut |
author_sort | Hardjono, Thomas |
author_variant | t h th |
building | Verbundindex |
bvnumber | BV043100405 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)53004789 (DE-599)BVBBV043100405 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02525nmm a2200457zc 4500</leader><controlfield tag="001">BV043100405</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580533426</subfield><subfield code="9">1-58053-342-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">158053659X</subfield><subfield code="9">1-58053-659-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580536592</subfield><subfield code="9">978-1-58053-659-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)53004789</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043100405</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hardjono, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Multicast and group security</subfield><subfield code="c">Thomas Hardjono, Lakshminath R. Dondeti</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Artech House</subfield><subfield code="c">©2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 307 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House computer security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Framework for multicast and group security -- Multicast data authentication -- Introduction to group key management -- Architectures and protocols for group key management -- Group key management algorithms -- Group security policy -- Securing multicast routing protocols -- Security in Reliable Multicast protocols -- Applications of multicast and their security -- Conclusion and future work</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multicasting (Computer networks)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dondeti, Lakshminath R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87726</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028524596</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87726</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87726</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043100405 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:25Z |
institution | BVB |
isbn | 1580533426 158053659X 9781580536592 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028524596 |
oclc_num | 53004789 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxii, 307 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Artech House |
record_format | marc |
series2 | Artech House computer security series |
spelling | Hardjono, Thomas Verfasser aut Multicast and group security Thomas Hardjono, Lakshminath R. Dondeti Boston Artech House ©2003 1 Online-Ressource (xxii, 307 pages) txt rdacontent c rdamedia cr rdacarrier Artech House computer security series Includes bibliographical references and index Framework for multicast and group security -- Multicast data authentication -- Introduction to group key management -- Architectures and protocols for group key management -- Group key management algorithms -- Group security policy -- Securing multicast routing protocols -- Security in Reliable Multicast protocols -- Applications of multicast and their security -- Conclusion and future work A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Multicasting (Computer networks) Security measures Computer networks Security measures Dondeti, Lakshminath R. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87726 Aggregator Volltext |
spellingShingle | Hardjono, Thomas Multicast and group security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Multicasting (Computer networks) Security measures Computer networks Security measures |
title | Multicast and group security |
title_auth | Multicast and group security |
title_exact_search | Multicast and group security |
title_full | Multicast and group security Thomas Hardjono, Lakshminath R. Dondeti |
title_fullStr | Multicast and group security Thomas Hardjono, Lakshminath R. Dondeti |
title_full_unstemmed | Multicast and group security Thomas Hardjono, Lakshminath R. Dondeti |
title_short | Multicast and group security |
title_sort | multicast and group security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Multicasting (Computer networks) Security measures Computer networks Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Multicasting (Computer networks) Security measures Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=87726 |
work_keys_str_mv | AT hardjonothomas multicastandgroupsecurity AT dondetilakshminathr multicastandgroupsecurity |