On the performance, feasibility, and use of forward-secure signatures
Proceedings of the 10th ACM conference on Computer and communications security
Delivering Attribute Certificates over GPRS
Proceedings of the 2004 ACM symposium on Applied computing
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks
Wireless Personal Communications: An International Journal
A scalable authorization approach for the Globus grid system
Future Generation Computer Systems - Special issue: Advanced grid technologies
From gridmap-file to VOMS: managing authorization in a Grid environment
Future Generation Computer Systems - Special issue: High-speed networks and services for data-intensive grids: The DataTAG project
Performance evaluation of public key-based authentication in future mobile communication systems
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
A Security Analysis of the Internet Chess Club
IEEE Security and Privacy
Performance analysis of TLS Web servers
ACM Transactions on Computer Systems (TOCS)
A consistent history authentication protocol
ACM SIGSOFT Software Engineering Notes
PKI-based secure mobile access to electronic health services and data
Technology and Health Care
Support of subscribers' certificates in a hybrid WLAN-3G environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
Laboratory experiments for network security instruction
Journal on Educational Resources in Computing (JERIC)
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Attack analysis & bio-inspired security framework for IPMultimedia subsystem
Proceedings of the 10th annual conference companion on Genetic and evolutionary computation
Attack analysis & bio-inspired security framework for IP multimedia subsystem
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Targeting Physically Addressable Memory
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Accelerating the AES encryption function in OpenSSL for embedded systems
International Journal of Information and Communication Technology
A PKI case study: implementing the server-based certificate validation protocol
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Networking aspects for the security of game input
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
From gridmap-file to VOMS: managing authorization in a Grid environment
Future Generation Computer Systems - Special issue: High-speed networks and services for data-intensive grids: The DataTAG project
Session key agreement protocol for end-to-end security in MANET
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
DRMFS: A file system layer for transparent access semantics of DRM-protected contents
Journal of Systems and Software
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
A multilayer overlay network architecture for enhancing IP services availability against dos
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Hi-index | 0.00 |
From the Publisher:Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols. Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library's advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included. OpenSSL may well answer your need to protect sensitive data. If that's the case, Network Security with OpenSSL is the only guide available on the subject.