Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Privacy of data outsourced to a cloud for selected readers through client-side encryption
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Heart-to-heart (H2H): authentication for implanted medical devices
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: * All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security; * Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts; * Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes; * Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509; * Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP; * Web security: Security issues associated with URLs, HTTP, HTML, and cookies; * Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes.