Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
On security issues in data networks.
~
Cai, Songlin.
Linked to FindBook
Google Book
Amazon
博客來
On security issues in data networks.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
On security issues in data networks./
Author:
Cai, Songlin.
Description:
79 p.
Notes:
Director: Weibo Gong.
Contained By:
Dissertation Abstracts International66-02B.
Subject:
Engineering, System Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3163651
ISBN:
9780496976256
On security issues in data networks.
Cai, Songlin.
On security issues in data networks.
- 79 p.
Director: Weibo Gong.
Thesis (Ph.D.)--University of Massachusetts Amherst, 2005.
This dissertation studies several security issues in data networks, to reveal the vulnerability, to propose defense mechanisms, to provide better tools for analysis, and to develop good security architecture.
ISBN: 9780496976256Subjects--Topical Terms:
1018128
Engineering, System Science.
On security issues in data networks.
LDR
:02221nam 2200289 a 45
001
972809
005
20110928
008
110928s2005 eng d
020
$a
9780496976256
035
$a
(UnM)AAI3163651
035
$a
AAI3163651
040
$a
UnM
$c
UnM
100
1
$a
Cai, Songlin.
$3
1296779
245
1 0
$a
On security issues in data networks.
300
$a
79 p.
500
$a
Director: Weibo Gong.
500
$a
Source: Dissertation Abstracts International, Volume: 66-02, Section: B, page: 1064.
502
$a
Thesis (Ph.D.)--University of Massachusetts Amherst, 2005.
520
$a
This dissertation studies several security issues in data networks, to reveal the vulnerability, to propose defense mechanisms, to provide better tools for analysis, and to develop good security architecture.
520
$a
This dissertation consists of the following three parts: (1) Internet-like topologies which capture the inherent properties are desirable for studying the resilience of Internet against malicious attack or normal failure. A novel hierarchical Internet topology generator is proposed to capture the inherent properties of Internet topology: power law degree distribution and hierarchical structure. (2) An analysis on the inherent trust built in TCP shows that the client could stretch a TCP connection tens of times and keep occupying the resource in the server with little abnormality to be detected. This could be potentially used in denial of service attack. (3) Some security setting like Bounded Storage Model calls for high-speed random number generating, while the current real random number generator would not be able to offer. A hybrid random-bit sequence generated by a pseudo-random number generator with the parameters specified randomly might be useful in this setting. A study on hybrid system using Linear Congruential Recurrence is presented, and hopefully it will provide insight for the study on hybrid system using one-way function.
590
$a
School code: 0118.
650
4
$a
Engineering, System Science.
$3
1018128
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
690
$a
0790
710
2 0
$a
University of Massachusetts Amherst.
$3
1019433
773
0
$t
Dissertation Abstracts International
$g
66-02B.
790
$a
0118
790
1 0
$a
Gong, Weibo,
$e
advisor
791
$a
Ph.D.
792
$a
2005
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3163651
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9131066
電子資源
11.線上閱覽_V
電子書
EB W9131066
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login