JGI '02 Proceedings of the 2002 joint ACM-ISCOPE conference on Java Grande
Sustaining Availability of Web Services under Distributed Denial of Service Attacks
IEEE Transactions on Computers
How to Protect DES Against Exhaustive Key Search
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Operational and epistemic approaches to protocol analysis: bridging the gap
LPAR'07 Proceedings of the 14th international conference on Logic for programming, artificial intelligence and reasoning
Breaking ciphers with COPACOBANA –a cost-optimized parallel code breaker
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
From the Publisher:A growing proportion of applications and protocols used over the Internet either have significant security-related features or have as their primary purpose the provision of some security facility. Many of these applications and protocols use cryptographic algorithms to implement security services. This book provides you with a comprehensive introduction to the use of cryptographic algorithms in data network security, with a special emphasis on practical internetworking applications. The book focuses on the underlying principles and main approaches to cryptography, and covers both conventional and public-key encryption and the most important algorithms, including DES, triple DES, RSA, and IDEA. Furthermore, the text discusses issues concerning authentication and digital signatures and explains the use of public-key encryption and secure hash functions in this context. It concludes with an examination into the practical uses of cryptographic algorithms in some key inter-networking applications.