|
Contents |
5 |
|
|
List of Figures |
9 |
|
|
INTRODUCTION |
12 |
|
|
SECURITY PROTOCOL DESIGN |
15 |
|
|
CHALLENGES IN PROTOCOL DESIGN AND ANALYSIS |
16 |
|
|
AUTHENTICATION PROTOCOL ANALYSIS |
60 |
|
|
SELF-CERTIFIED APPROACH FOR AUTHENTICATED AGREEMENT |
70 |
|
|
ADAPTIVE RANDOM |
97 |
|
|
DISTRIBUTION SCHEMES |
97 |
|
|
FOR WIRELESS SENSOR NETWORKS |
97 |
|
|
INTRUSION DETECTION, DEFENSE, MEASURE- MENT |
112 |
|
|
MEASURING RELATIVE ATTACK SURFACES |
113 |
|
|
A MODELING OF'INTRUSION DETECTION SYSTEMS WITH IDENTIFICATION CAPABILITY |
142 |
|
|
A SOURCE-END DEFENSE SYSTEM AGAINST DDOS ATTACKS |
149 |
|
|
BEAGLE: TRACKING SYSTEM FAILURES FOR REPRODUCING SECURITY FAULTS |
171 |
|
|
WEB APPLICATION SECURITY-PAST, PRESENT, AND FUTURE |
184 |
|
|
SECURING JPEG2000 CODE-STREAMS |
229 |
|
|
A SECRET INFORMATION HIDING SCHEME BASED ON SWITCHING TREE CODING |
254 |
|
|
Index |
263 |
|