Hilfe Warenkorb Konto Anmelden
 
 
   Schnellsuche   
     zur Expertensuche                      
Hop Integrity in the Internet
  Großes Bild
 
Hop Integrity in the Internet
von: Chin-Tser Huang, Mohamed G. Gouda
Springer-Verlag, 2006
ISBN: 9780387294445
121 Seiten, Download: 5093 KB
 
Format:  PDF
geeignet für: Apple iPad, Android Tablet PC's Online-Lesen PC, MAC, Laptop

Typ: A (einfacher Zugriff)

 

 
eBook anfordern
Inhaltsverzeichnis

  Contents 7  
  Preface 9  
  Chapter 1 INTRODUCTION 12  
  Chapter 2 ABSTRACT PROTOCOL NOTATION 18  
     1. PROCESSES AND CHANNELS 18  
     2. CONSTANTS, VARIABLES, AND ACTIONS 19  
     3. STATE TRANSITION DIAGRAM 22  
     4. PROCESS ARRAYS, PARAMETERS, AND PARAMETERIZED ACTIONS 25  
  Chapter 3 ABSTRACT SECURE PROTOCOLS 28  
     1. ASSUMPTIONS ABOUT THE ADVERSARY 29  
     2. SECURITY KEYS 29  
     3. MESSAGE DIGESTS 31  
     4. NONCES 31  
     5. TIMEOUT ACTIONS 32  
     6. AN EXAMPLE PROTOCOL WITH SECURITY FEATURES 32  
  Chapter 4 DENIAL-OF-SERVICE ATTACKS 36  
     1. COMMUNICATION-STOPPING ATTACKS 37  
     2. RESOURCE-EXHAUSTING ATTACKS 39  
  Chapter 5 SECURE ADDRESS RESOLUTION PROTOCOL 42  
     1. ARCHITECTURE OF SECURE ADDRESS RESOLUTION 42  
     2. THE INVITE-ACCEPT PROTOCOL 46  
     3. THE REQUEST-REPLY PROTOCOL 52  
     4. EXTENSIONS 58  
        4.1 Insecure Address Resolution 59  
        4.2 A Backup Server 64  
        4.3 System Diagnosis 65  
        4.4 Serving Multiple Ethernets 65  
  Chapter 6 WEAK HOP INTEGRITY PROTOCOL 66  
     1. SECRET EXCHANGE PROTOCOL 67  
     2. WEAK INTEGRITY CHECK PROTOCOL 73  
  Chapter 7 STRONG HOP INTEGRITY USING SOFT SEQUENCE NUMBERS 78  
     1. SOFT SEQUENCE NUMBER PROTOCOL 78  
     2. STRONG INTEGRITY CHECK PROTOCOL 81  
  Chapter 8 STRONG HOP INTEGRITY USING HARD SEQUENCE NUMBERS 86  
     1. HARD SEQUENCE NUMBER PROTOCOL 87  
     2. A PROTOCOL WITH SAVE AND FETCH OPERATIONS 89  
     3. CONVERGENCE OF NEW HARD SEQUENCE NUMBER PROTOCOL 94  
     4. APPLICATION OF SAVE AND FETCH IN STRONG HOP INTEGRITY PROTOCOL 97  
     5. TRADEOFFS BETWEEN SOFT SEQUENCE NUMBERS AND HARD SEQUENCE NUMBERS 97  
  Chapter 9 IMPLEMENTATION CONSIDERATIONS 99  
     1. KEYS AND SECRETS 99  
     2. TIMEOUTS 100  
     3. SEQUENCE NUMBERS 100  
     4. MESSAGE OVERHEAD 102  
  Chapter 10 OTHER USES OF HOP INTEGRITY 104  
     1. MOBILE IP 104  
     2. SECURE MULTICAST 108  
     3. SECURITY OF ROUTING PROTOCOLS 111  
        3.1 Security of RIP 112  
        3.2 Security of OSPF 113  
        3.3 Security of RSVP 115  
     4. SECURITY IN AD HOC NETWORKS AND SENSOR NETWORKS 116  
  References 118  
  Index 122  


nach oben


  Mehr zum Inhalt
Kapitelübersicht
Kurzinformation
Inhaltsverzeichnis
Leseprobe
Blick ins Buch
Fragen zu eBooks?

  Medientyp
  eBooks
  eJournal
  alle

  Navigation
Belletristik / Romane
Computer
Geschichte
Kultur
Medizin / Gesundheit
Philosophie / Religion
Politik
Psychologie / Pädagogik
Ratgeber
Recht
Reise / Hobbys
Sexualität / Erotik
Technik / Wissen
Wirtschaft

  Info
Hier gelangen Sie wieder zum Online-Auftritt Ihrer Bibliothek
© 2008-2024 ciando GmbH | Impressum | Kontakt | F.A.Q. | Datenschutz