J2EE support for wireless services
Journal of Systems and Software - Special issue: Software engineering education and training
Evaluation of a none compressed 12-lead ECG transmission via internet using IPSec
Computers in Biology and Medicine
Secure VPNs for Trusted Computing Environments
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Protection of LAN-wide, P2P interactions: a holistic approach
International Journal of Communication Networks and Distributed Systems
Extending IPsec for efficient remote attestation
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Efficient authentication for mobile and pervasive computing
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Building Secure Tunnel from PPP Wireless Network
Wireless Personal Communications: An International Journal
E-MACs: towards more secure and more efficient constructions of secure channels
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Block-Level storage security architectures
ICCSA'06 Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I
An evaluation and analysis for IP VPN model in IPv6 transition environment
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
On the exploitation of a high-throughput SHA-256 FPGA design for HMAC
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
On the exploitation of a high-throughput SHA-256 FPGA design for HMAC
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Cryptography in theory and practice: the case of encryption in IPsec
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Towards a trustworthy service marketplace for the future internet
The Future Internet
Hi-index | 0.00 |
From the Publisher:The insider's guide to IPSec for every network professionalupdated for the newest standards, techniques, and applications.Using IPSec, companies can build VPNs and other Internet-centered applications with confidence that their data will remain secure. IPSec, Second Edition is the most authoritative, comprehensive, accessible, and up-to-date guide to IPSec technology. Two leading authorities in IPSec standardization and implementation cover every facet of IPSec architecture and deployment, review important technical advances since IPSec was first standardized, and present new case studies that show how IPSec can provide end-to-end security in real business environments. Coverage includes: New, in-depth deployment guidance: policy definition, representation, distribution, and management New IPSec enhancements: compression, multicast, key recovery, L2TP support, PKI integration, and more IPSec architecture and components: payloads, headers, Internet Key Exchange, security associations, and more Implementation architecture and techniques, including overlapping and shared security associations, nested and chained tunnels, and more IPSec security in host-to-host, host-to-gateway, and gateway-to-gateway scenarios Establishing secure VPN tunneling A detailed look inside the IPSec kernelIPSec, Second Edition delivers the techniques and insight you need to protect all your digital assets, wherever they areon the Internet, your intranet, your extranet, or your VPN. Whether you're a networking or Web professional, software developer, or security specifind it indispensable.