Wonder Club world wonders pyramid logo
×

Practical cryptography for internetworks Book

Practical cryptography for internetworks
Practical cryptography for internetworks, A growing proportion of applications and protocols used over the Internet either have significant security-related features or have as their primary purpose the provision of some security facility. Many of these applications and protocols use cryptographi, Practical cryptography for internetworks has a rating of 2.5 stars
   2 Ratings
X
Practical cryptography for internetworks, A growing proportion of applications and protocols used over the Internet either have significant security-related features or have as their primary purpose the provision of some security facility. Many of these applications and protocols use cryptographi, Practical cryptography for internetworks
2.5 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
50 %
2
50 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Practical cryptography for internetworks
  • Written by author William Stallings
  • Published by Los Alamitos, Calif. : IEEE Computer Society Press, c1996., 1996/02/01
  • A growing proportion of applications and protocols used over the Internet either have significant security-related features or have as their primary purpose the provision of some security facility. Many of these applications and protocols use cryptographi
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Preface
Ch. 1 Principles of Cryptography 1
The Data Encryption Standard: An Update 17
The Data Encryption Standard (DES) and its Strength Against Attacks 23
Efficient DES Key Search 31
The RC5 Encryption Algorithm
The Mathematics of Public-Key Cryptography 80
Cracking the Uncrackable Code 92
Principles of Key Management 93
Ch. 2 Authentication and Digital Signatures 103
Authentication for Distributed Systems 113
Authentication in Distributed Systems: Theory and Practice 126
A Logic of Authentication 172
Public Key Cryptography 222
Digital Signatures: A Tutorial Survey 229
Digital Signature Standard 239
One-Way Hash Functions 244
Ch. 3 Data Network Security Applications 249
Security in Electronic Messaging Systems 263
Internet Privacy Enhanced Mail 270
Secure Network Access Using Multiple Applications of AT&T's Smart Card 283
Kerberos: An Authentication Service for Computer Networks 295
Applicability of Smart Cards to Network User Authentication 301
Why Cryptosystems Fail 316
Cryptanalysis and Protocol Failures 324
Internet Security Standards: Past, Present, and Future 333
Glossary 341
Acronyms 345
Annotated Bibliography 347
About the Author 355


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Practical cryptography for internetworks, A growing proportion of applications and protocols used over the Internet either have significant security-related features or have as their primary purpose the provision of some security facility. Many of these applications and protocols use cryptographi, Practical cryptography for internetworks

X
WonderClub Home

This item is in your Collection

Practical cryptography for internetworks, A growing proportion of applications and protocols used over the Internet either have significant security-related features or have as their primary purpose the provision of some security facility. Many of these applications and protocols use cryptographi, Practical cryptography for internetworks

Practical cryptography for internetworks

X
WonderClub Home

This Item is in Your Inventory

Practical cryptography for internetworks, A growing proportion of applications and protocols used over the Internet either have significant security-related features or have as their primary purpose the provision of some security facility. Many of these applications and protocols use cryptographi, Practical cryptography for internetworks

Practical cryptography for internetworks

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: