A survey of issues in computer network security
Computers and Security
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Cryptography and data security
Cryptography and data security
Mobile agent based intrusion detection system adopting hidden Markov model
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
A new framework for secure network management
Computer Communications
Hi-index | 0.00 |
In order for a distributed network to function securely, the integrity of the data transmitted over the communication links must be maintained. The use of either link encryption or end-to-end encryption will help to maintain the integrity of transmitted data, although there are differences in the level of security which they provide. This paper begins with an analysis of link encryption and end-to-end encryption. Five communication security goals are then described which concern the protection of transmitted data through the use of these encryption techniques.