[go: up one dir, main page]

Jain, 2009 - Google Patents

Security in computer networks

Jain, 2009

View PDF
Document ID
15752354895555536921
Author
Jain R
Publication year
Publication venue
Washington Univ. Saint Louis, St. Louis, MO, USA

External Links

Snippet

Security in Computer Networks Page 1 ©2024 Raj Jain http://www.cse.wustl.edu/~jain/cse473-24/ Washington University in St. Louis Student Questions Security in Computer Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video …
Continue reading at classes.engineering.wustl.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
Hickman et al. The SSL protocol
Ristic Bulletproof SSL and TLS: Understanding and deploying SSL/TLS and PKI to secure servers and web applications
Jain Security in computer networks
Boonkrong Authentication and Access Control
WO2016065321A1 (en) Secure communication channel with token renewal mechanism
JP2016036166A (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
Ristić Bulletproof SSL and TLS
Banoth et al. Classical and Modern Cryptography for Beginners
CN101296083A (en) An encrypted data transmission method and system
Banoth et al. Asymmetric Key Cryptography
Banoth et al. An introduction to classical and modern cryptography
Gupta Cryptography and network security
Chaeikar et al. Secure SMS transmission based on social network messages
Yevseiev et al. The development of the method of multifactor authentication based on hybrid cryptocode constructions on defective codes
Shojaie et al. Enhancing EAP-TLS authentication protocol for IEEE 802.11 i
CN117749909A (en) Data transmission method, data processing method and computer equipment
Geetha et al. Introduction To Cryptography And Network Security
JP5004086B2 (en) Authentication system using short sequences
CN115801331A (en) Method, device, system and storage medium for encrypting communication information
Rösler et al. Interoperability between messaging services secure–implementation of encryption
Nithya et al. An Analysis on Cryptographic Algorithms for Handling Network Security Threats
Kessler Introduction to cryptography
Limniotis et al. Cryptography threats
Chauhan et al. Enhancing Mobile Cloud Computing Security with SHA-256 and RSA for User Authentication and Data Sharing
Deokar File Transfer on Cloud using Diffie-Hellman Key Exchange in Conjunction with AES Encryption