An object-oriented cryptosystem based on two-level reconfigurable computing architecture
Journal of Systems and Software
Multiple-channel security architecture and its implementation over SSL
EURASIP Journal on Wireless Communications and Networking
On agent technology for e-commerce: trust, security and legal issues
The Knowledge Engineering Review
A rule-based approach to security test automation on network layer
TELE-INFO'05 Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics
Bilinear-pairing-based remote user authentication schemes using smart cards
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
International Journal of Communication Networks and Distributed Systems
An efficient ID-Based bilinear key predistribution scheme for distributed sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Security management in wireless sensor networks with a public key based scheme
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Hi-index | 0.00 |
From the Publisher:If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems. This book takes a long-term view. It is not a 'how-to' implementation guide for today's practitioners. It is a training text for the engineers of the future. As well as providing an in-depth introduction to relevant cryptographic principles, algorithms and protocols, Internet Security links them to the technologies in use on the Internet today. State-of-the-art analyses of IETF standards plus summaries and explanations of RFC documents, numerous examples and a list of frequently used acronyms make this book a comprehensive and valuable reference for students, researchers and professional engineers alike -- anyone engaged in the long-term development of secure systems.