Network Security

This volume highlights and addresses several key challenges in the area of Network Security. Covered is a comprehensive array of topics including secure metering, group key management, denial-of-service attacks, routing and intrusion detection and many mo

  • PDF / 3,760,715 Bytes
  • 284 Pages / 439 x 666 pts Page_size
  • 97 Downloads / 264 Views

DOWNLOAD

REPORT


Scott C.-H. Huang  David MacCallum Ding-Zhu Du Editors

Network Security

123

Editors Scott C.-H. Huang Department of Computer Science City University of Hong Kong Tat Chee Avenue 83 Hong Kong Hong Kong SAR [email protected] David MacCallum Department of Computer Science & Engineering University of Minnesota Union Street SE., 200 55455-0000 Minneapolis Minnesota 4-192 EE/CS Bldg. USA

Ding-Zhu Du Department of Computer Science University of Texas, Dallas Erik Jonsson School of Engineering & Computer Science W. Campbell Road 800 75080 Richardson Texas USA [email protected]

ISBN 978-0-387-73820-8 e-ISBN 978-0-387-73821-5 DOI 10.1007/978-0-387-73821-5 Springer New York Dordrecht Heidelberg London Library of Congress Control Number: 2010930848 c Springer Science+Business Media, LLC 2010  All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface

Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives. These changes also brought about new challenges, particularly in the area of security. Network security is essential to protect data integrity, confidentiality, access control, authentication, user privacy, and so on. All of these aspects are critical to provide fundamental network functionalities. This book covers a comprehensive array of topics in network security including secure metering, group key management, DDoS attacks, and many others. It can be used as a handy reference book for researchers, educators, graduate students, as well as professionals in the field of network security. This book contains 11 refereed chapters from prominent researchers working in this area around the globe. Although these selected topics could not cover every aspect, they do represent the most fundamental and practical techniques. This book has been made possible by the great efforts and contributions of many people. First, we thank the authors of each chapter for contributing informative and insightful chapters. Then, we thank all reviewers for their invaluable comments and suggestions that improved the quality of this book. Finally, we thank the staff members from Springer for publishing this work. Besides, we would like to dedicate this boo