Sold by Mighty Ape
This work presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks and satellite broadcast. The book presents and compares techniques for basic operations including: key distribution for access control; source authentication of transmissions; and non-repudiation of streams. It discusses how to realize these operations both with high performance processors and resource constrained processors, and shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. The book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
We are committed to protecting your rights under the Consumer Guarantees Act and working with our suppliers to assist with warranty claims. Products sold by Mighty Ape will be covered by a Manufacturer's Warranty for at least a one-year period from the date of purchase.
Your warranty will cover any manufacturing defects which, if existing, will present themselves within this warranty period.
Your warranty will not cover normal wear and tear, faults caused by misuse, and accidents which cause damage or theft caused after delivery. Using the product in a way it is not designed for will void your warranty.
Please refer to our Help Centre for more information.
Save with Primate
Earn $3.03 Points Credit*
Exclusive Deals
Mighty Ape Travel discount
^FREE 14 day trial. Primate will be charged $89 / 365 days after free trial, cancel anytime. Delivery benefits available in selected postcodes only. †*T&Cs apply, click for details.