Advances in Security of Information and Communication by Leovigildo Sánchez-Casado, Rafael Alejandro Rodríguez-Gómez,

By Leovigildo Sánchez-Casado, Rafael Alejandro Rodríguez-Gómez, Roberto Magán-Carrión (auth.), Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba (eds.)

This booklet constitutes the refereed complaints of the foreign convention on Advances in safeguard of knowledge and verbal exchange Networks, Sec internet 2013, held in Cairo, Egypt, in September 2013. The 21 revised complete papers awarded have been rigorously reviewed and chosen from sixty two submissions. The papers are equipped in topical sections on networking defense; info and knowledge safety; authentication and privateness; protection applications.

Show description

Read or Download Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings PDF

Best security books

The Library Security and Safety Guide to Prevention, Planning, and Response

Safeguard making plans, a part of catastrophe reaction and non-stop operations making plans, is the most important to proactively addressing capability questions of safety.

Afghanistan's Local War: Building Local Defense Forces

In Afghanistan, neighborhood groups have performed a serious position in defense, particularly in rural components. Afghan nationwide safeguard forces are vital to the topdown method, however the Afghan govt and NATO forces additionally have to leverage neighborhood groups to realize a complementary bottomup approach. This research discusses the viability of building neighborhood safeguard forces in Afghanistan and addresses matters concerning the knowledge of such regulations.


E-book by means of

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings

This e-book constitutes the refereed lawsuits of the Pacific Asia Workshop on Intelligence and safeguard Informatics, PAISI 2009, held in Bangkok, Thailand, in April 2009. the ten revised complete papers, 7 revised brief papers including 1 keynote lecture have been rigorously reviewed and chosen from various submissions.

Additional info for Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings

Example text

Mobile agents suffer from three types of security threats [12], agent to host threat where the agent gains unauthorized access to the host resources and tampers with it, agent to agent threat and host to agent security threat where the host compromises the agent residing on it, which is considered to be the most difficult attack to prevent since the host has a full control over the agent’s code and its data. Recent work has been done 30 A. Amer, A. A. e. code obfuscation, code encryption, white box cryptography, black box cryptography and code signing [13].

Section 2 highlights background and related work. Section 3 describes the proposed Chord-enabled key storage and lookup scheme. Section 4 illustrates performance evaluation results. Finally, the conclusion and the projected future work is covered in section 5. 2 Background and Related Work This section outlines relevant background and related work. 1, describes mobile agents and their advantages and applications. 2, shows the mechanism and methodology of the Chord algorithm. 3, illustrates the related work in focus.

Fig. 5. Control messages Vs number of visited nodes The results seen in Figure 5 can be validated using equation (2), where n1 = 2, since Case 1 appears 2 times from 1→ 9 and 15→ 17, where only Reqkey message is sent from the node to its cluster head. n2 = 5, Case 2 appears 5 times from 9→ 11, 13→ 14, 21→ 22, 23→ 25, 25→ 26, where Reqkey, Getkey messages are sent. n2 = 8, since Case 3 appears 8 times in the move from 11→ 12, 12→ 13, 14→ 15, 17→ 18, 18→ 19, 19→ 20, 20→ 21, 22→ 23 where Reqkey, Findsucc and CKSL-MA-HWSN 39 Getkey messages are sent, therefore y = 3 in this itinerary since the max number of messages shown in Case 3 is 3 messages.

Download PDF sample

Rated 4.01 of 5 – based on 8 votes