Jain, 2009 - Google Patents
Security in computer networksJain, 2009
View PDF- Document ID
- 15752354895555536921
- Author
- Jain R
- Publication year
- Publication venue
- Washington Univ. Saint Louis, St. Louis, MO, USA
External Links
Snippet
Security in Computer Networks Page 1 ©2024 Raj Jain http://www.cse.wustl.edu/~jain/cse473-24/
Washington University in St. Louis Student Questions Security in Computer Networks Raj Jain
Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hickman et al. | The SSL protocol | |
| Ristic | Bulletproof SSL and TLS: Understanding and deploying SSL/TLS and PKI to secure servers and web applications | |
| Jain | Security in computer networks | |
| Boonkrong | Authentication and Access Control | |
| WO2016065321A1 (en) | Secure communication channel with token renewal mechanism | |
| JP2016036166A (en) | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |
| Ristić | Bulletproof SSL and TLS | |
| Banoth et al. | Classical and Modern Cryptography for Beginners | |
| CN101296083A (en) | An encrypted data transmission method and system | |
| Banoth et al. | Asymmetric Key Cryptography | |
| Banoth et al. | An introduction to classical and modern cryptography | |
| Gupta | Cryptography and network security | |
| Chaeikar et al. | Secure SMS transmission based on social network messages | |
| Yevseiev et al. | The development of the method of multifactor authentication based on hybrid cryptocode constructions on defective codes | |
| Shojaie et al. | Enhancing EAP-TLS authentication protocol for IEEE 802.11 i | |
| CN117749909A (en) | Data transmission method, data processing method and computer equipment | |
| Geetha et al. | Introduction To Cryptography And Network Security | |
| JP5004086B2 (en) | Authentication system using short sequences | |
| CN115801331A (en) | Method, device, system and storage medium for encrypting communication information | |
| Rösler et al. | Interoperability between messaging services secure–implementation of encryption | |
| Nithya et al. | An Analysis on Cryptographic Algorithms for Handling Network Security Threats | |
| Kessler | Introduction to cryptography | |
| Limniotis et al. | Cryptography threats | |
| Chauhan et al. | Enhancing Mobile Cloud Computing Security with SHA-256 and RSA for User Authentication and Data Sharing | |
| Deokar | File Transfer on Cloud using Diffie-Hellman Key Exchange in Conjunction with AES Encryption |