Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Network Security Essentials: Applications and Standards (3rd Edition)July 2006
Publisher:
  • Prentice-Hall, Inc.
  • Division of Simon and Schuster One Lake Street Upper Saddle River, NJ
  • United States
ISBN:978-0-13-238033-1
Published:01 July 2006
Skip Bibliometrics Section
Reflects downloads up to 15 Oct 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Maram B, Gnanasekar J, Manogaran G and Balaanand M (2019). Intelligent security algorithm for UNICODE data privacy and security in IOT, Service Oriented Computing and Applications, 13:1, (3-15), Online publication date: 1-Mar-2019.
  2. (2019). A novel method for network intrusion detection based on nonlinear SNE and SVM, International Journal of Artificial Intelligence and Soft Computing, 6:4, (265-286), Online publication date: 1-Jan-2018.
  3. Tao X, Li G, Sun D and Cai H (2017). A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds, Future Generation Computer Systems, 76:C, (582-589), Online publication date: 1-Nov-2017.
  4. Gupta S and Kumar P (2017). Profile and Back Off Based Distributed NIDS in Cloud, Wireless Personal Communications: An International Journal, 94:4, (2879-2900), Online publication date: 1-Jun-2017.
  5. Kang J, Park G and Park J (2016). Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments, The Journal of Supercomputing, 72:11, (4319-4336), Online publication date: 1-Nov-2016.
  6. ACM
    Carrara B and Adams C A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, (115-126)
  7. Abuzneid A, Sobh T and Faezipour M (2018). An enhanced communication protocol for location privacy in WSN, International Journal of Distributed Sensor Networks, 2015, (62-62), Online publication date: 1-Jan-2015.
  8. Yu W, Griffith D, Ge L, Bhattarai S and Golmie N (2015). An integrated detection system against false data injection attacks in the Smart Grid, Security and Communication Networks, 8:2, (91-109), Online publication date: 25-Jan-2015.
  9. ACM
    Ye L, Fodor V, Giannetsos T and Papadimitratos P Path Metric Authentication for Low-Power and Lossy Networks Proceedings of the 1st ACM International Workshop on Cyber-Physical Systems for Smart Water Networks, (1-6)
  10. ACM
    Dolev S and Kopeetsky M (2012). Anonymous transactions in computer networks, ACM Transactions on Autonomous and Adaptive Systems, 7:2, (1-14), Online publication date: 1-Jul-2012.
  11. ACM
    Al-Khashab E, Al-Anzi F and Salman A PSIAQOP Proceedings of the Second Kuwait Conference on e-Services and e-Systems, (1-8)
  12. Pöhls H and Höhne F The role of data integrity in EU digital signature legislation -- achieving statutory trust for sanitizable signature schemes Proceedings of the 7th international conference on Security and Trust Management, (175-192)
  13. ACM
    Huang T, Zeadally S, Chilamkurti N and Shieh C (2010). A programmable network address translator, ACM Transactions on Internet Technology, 10:1, (1-37), Online publication date: 1-Feb-2010.
  14. ACM
    Degabriele J and Paterson K On the (in)security of IPsec in MAC-then-encrypt configurations Proceedings of the 17th ACM conference on Computer and communications security, (493-504)
  15. Wang H, Bai G and Chen H (2010). A Gbps IPSec SSL Security Processor Design and Implementation in an FPGA Prototyping Platform, Journal of Signal Processing Systems, 58:3, (311-324), Online publication date: 1-Mar-2010.
  16. Chen L, Xie X, Xu Y and Xia D Security analysis and design of a uniform identity authentication system Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication, (174-178)
  17. Dolev S and Kopeetsky M Anonymous Transactions in Computer Networks Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, (297-310)
  18. FASLI M (2007). On agent technology for e-commerce, The Knowledge Engineering Review, 22:1, (3-35), Online publication date: 1-Mar-2007.
  19. Wu H, Lee C, Chen W and Lee T Algorithm of cipher text containing key to produce cipher text transmitted in network security Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases - Volume 6, (201-205)
  20. Ohri J and Dhillon G Optimizing security in e-commerce through implementation of hybird tecnologies Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems, (1-6)
  21. Panato A, Barcelos M and Reis R A Low Device Occupation IP to Implement Rijndael Algorithm Proceedings of the conference on Design, Automation and Test in Europe: Designers' Forum - Volume 2
Contributors
  • The U.S. Military Academy at West Point

Recommendations