Internet security: firewalls and beyond
Communications of the ACM
Early adopters an internet 2 middleware project
Proceedings of the 28th annual ACM SIGUCCS conference on User services: Building the future
Approaching Secure Communications in a Message-Oriented Mobile Computing Environment
Multimedia Tools and Applications
Security at the Internet Layer
Computer
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
Authorization Methods for E-Commerce Applications
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Middleware '98 Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing
Hi-index | 0.02 |
From the Publisher:As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME. The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network.