語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
On security issues in data networks.
~
Cai, Songlin.
FindBook
Google Book
Amazon
博客來
On security issues in data networks.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
On security issues in data networks./
作者:
Cai, Songlin.
面頁冊數:
79 p.
附註:
Director: Weibo Gong.
Contained By:
Dissertation Abstracts International66-02B.
標題:
Engineering, Electronics and Electrical. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3163651
ISBN:
9780496976256
On security issues in data networks.
Cai, Songlin.
On security issues in data networks.
- 79 p.
Director: Weibo Gong.
Thesis (Ph.D.)--University of Massachusetts Amherst, 2005.
This dissertation studies several security issues in data networks, to reveal the vulnerability, to propose defense mechanisms, to provide better tools for analysis, and to develop good security architecture.
ISBN: 9780496976256Subjects--Topical Terms:
626636
Engineering, Electronics and Electrical.
On security issues in data networks.
LDR
:02221nam 2200289 a 45
001
972809
005
20110928
008
110928s2005 eng d
020
$a
9780496976256
035
$a
(UnM)AAI3163651
035
$a
AAI3163651
040
$a
UnM
$c
UnM
100
1
$a
Cai, Songlin.
$3
1296779
245
1 0
$a
On security issues in data networks.
300
$a
79 p.
500
$a
Director: Weibo Gong.
500
$a
Source: Dissertation Abstracts International, Volume: 66-02, Section: B, page: 1064.
502
$a
Thesis (Ph.D.)--University of Massachusetts Amherst, 2005.
520
$a
This dissertation studies several security issues in data networks, to reveal the vulnerability, to propose defense mechanisms, to provide better tools for analysis, and to develop good security architecture.
520
$a
This dissertation consists of the following three parts: (1) Internet-like topologies which capture the inherent properties are desirable for studying the resilience of Internet against malicious attack or normal failure. A novel hierarchical Internet topology generator is proposed to capture the inherent properties of Internet topology: power law degree distribution and hierarchical structure. (2) An analysis on the inherent trust built in TCP shows that the client could stretch a TCP connection tens of times and keep occupying the resource in the server with little abnormality to be detected. This could be potentially used in denial of service attack. (3) Some security setting like Bounded Storage Model calls for high-speed random number generating, while the current real random number generator would not be able to offer. A hybrid random-bit sequence generated by a pseudo-random number generator with the parameters specified randomly might be useful in this setting. A study on hybrid system using Linear Congruential Recurrence is presented, and hopefully it will provide insight for the study on hybrid system using one-way function.
590
$a
School code: 0118.
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
650
4
$a
Engineering, System Science.
$3
1018128
690
$a
0544
690
$a
0790
710
2 0
$a
University of Massachusetts Amherst.
$3
1019433
773
0
$t
Dissertation Abstracts International
$g
66-02B.
790
$a
0118
790
1 0
$a
Gong, Weibo,
$e
advisor
791
$a
Ph.D.
792
$a
2005
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3163651
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9131066
電子資源
11.線上閱覽_V
電子書
EB W9131066
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入