Protecting Your Site with Access Controls
Linux Journal
Password Authentication Using Multiple Servers
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Algebraic Signatures for Scalable Distributed Data Structures
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
rDCF: A Relay-Enabled Medium Access Control Protocol for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Plug-and-play PKI: a PKI your mother can use
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
An Automated Signature-Based Approach against Polymorphic Internet Worms
IEEE Transactions on Parallel and Distributed Systems
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Elliptic curve based hardware architecture using cellular automata
Mathematics and Computers in Simulation
Engineering of Software-Intensive Systems: State of the Art and Research Challenges
Software-Intensive Systems and New Computing Paradigms
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Privacy-Friendly Electronic Traffic Pricing via Commits
Formal Aspects in Security and Trust
Towards a conceptual framework for digital dossier management in criminal proceedings
LawTech '07 Proceedings of the Fifth IASTED International Conference on Law and Technology
Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs
Computers and Electrical Engineering
Security, privacy, and usability: a high common ground
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Logic programming for combinatorial problems
Artificial Intelligence Review
Anonymity services for multi-agent systems
Web Intelligence and Agent Systems
Enforcing integrity of agent migration paths by distribution of trust
International Journal of Intelligent Information and Database Systems
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
International Journal of Wireless and Mobile Computing
USENIXATC'10 Proceedings of the 2010 USENIX conference on USENIX annual technical conference
Public key cryptographic system using mandelbrot sets
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
A fair online payment system for digital content via subliminal channel
Electronic Commerce Research and Applications
Teaching security labs with web applications, buffer overflows and firewall configurations
Journal of Computing Sciences in Colleges
Web application security based on trusted network connection
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part II
Cellular automata architecture for elliptic curve cryptographic hardware
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
Modular divider for elliptic curve cryptographic hardware based on programmable CA
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part IV
Authentication and authorisation infrastructures in b2c e-commerce
EC-Web'05 Proceedings of the 6th international conference on E-Commerce and Web Technologies
Evolutionary hardware architecture for division in elliptic curve cryptosystems over GF(2n)
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Improvements to mitchell's remote user authentication protocol
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Perceptions of foundational knowledge by computer science students
Proceedings of the Seventeenth Western Canadian Conference on Computing Education
Future perspectives: the car and its IP-address - a potential safety and security risk assessment
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Information Systems and e-Business Management
Top 10 hands-on cybersecurity exercises
Journal of Computing Sciences in Colleges
Hi-index | 0.01 |
The classic guide to network securityï戮聳now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society.Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.Prentice Hall Series in Computer Networking and Distributed Systems