A certificate revocation scheme for wireless ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Data security key establishment in AODV
EHAC'07 Proceedings of the 6th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Data security key establishment in AODV
EHAC'07 Proceedings of the 6th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Anonymous Routing for Mobile Wireless Ad Hoc Networks
International Journal of Distributed Sensor Networks - Heterogenous Wireless Ad Hoc and Sensor Networks
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems
International Journal of Internet Protocol Technology
Anonymous routing in wireless mobile ad hoc networks to prevent location disclosure attacks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Design and deployment of IP virtual private networks: a case study
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
Hi-index | 0.01 |
From the Publisher:Written in conjunction with RSA Securitythe most trusted name in e-securitythis book gives a detailed presentation of IPSec components,implementation,and VPN interoperability. Part of the RSA Press Series. Improve network security using this comprehensive RSA Security-endorsed guidebook Implement IPSec across a virtual private network and you'll ensure the highest level of network security available. This authoritative book explains IP security protocols,ways to implement these protocols and VPN interoperability. Written in conjunction with and fully endorsed by the experts at RSA Security,this book offers comprehensive coverage of the technological components of IPSec and its underlying architecture. It also includes a case study detailing the configuration of a VPN client and security gateway with PKI components. For safeguarding your system and improving security across your network,this is the most definitive guide to IPSec. This book will show you how to:Understand the technological components of IPSecGet details on symmetric-key cryptographic algorithms-including AES and the other 4 AES finalists,CAST,Blowfish,IDEA,RC2,RC5,and SkipjackAssess the relative strength and speed of cryptographic algorithmsGet details on elliptic curve cryptography,digital signature standard,Diffie-Hellman key exchange,hash functions and message authentication codeLearn the differences between private and symmetric-key cryptosystemsUnderstand PKI infrastructure and the managed certificate protocolGain insight into Security Association (SA) and key managementImplement VPN solutions in a variety of scenarios