FIE'09 Proceedings of the 39th IEEE international conference on Frontiers in education conference
Recovery of flash memories for reliable mobile storages
Mobile Information Systems
Fast and secure handover schemes based on proposed WiMAX over EPON network security architecture
WSEAS TRANSACTIONS on COMMUNICATIONS
FLD-based detection of re-compressed speech signals
Proceedings of the 12th ACM workshop on Multimedia and security
Toward secure and private service discovery anywhere anytime
Frontiers of Computer Science in China
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
Security Issues and Challenges for Cyber Physical System
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
PEA: Polymorphic Encryption Algorithm based on quantum computation
International Journal of Systems, Control and Communications
Visualizing secure Hash algorithm (SHA-1) on the web
AMT'11 Proceedings of the 7th international conference on Active media technology
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
Enhancing network security education with research and development content
Proceedings of the 2011 conference on Information technology education
Preventing the cluster formation attack against the hierarchical OLSR protocol
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Feature: The evolution of the Advanced Encryption Standard
Network Security
Chaotic encryption method based on life-like cellular automata
Expert Systems with Applications: An International Journal
Design and development of a desktop monitoring system
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
An efficient binary playfair algorithm using a 4×4 playfair key matrix
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
An Approach to Data Confidentiality Protection in Cloud Environments
International Journal of Web Services Research
A block cipher mode of operation with two keys
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
QoS aware adaptive security scheme for video streaming in MANETs
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
A stochastic model of attack process for the evaluation of security metrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design of trustworthy smartphone-based multimedia services in cultural environments
Electronic Commerce Research
The Assessment of Learning Outcomes in Information Assurance Curriculum
Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference
Hi-index | 0.00 |
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.