scispace - formally typeset
Journal ArticleDOI

Tutorial: Security in computer networks and distributed systems

TLDR
Some of the commonly known security threats, together with the security services and state-of-the-art mechanisms that can be used to provide protection against these threats are introduced.
About
This article is published in Computer Communications.The article was published on 1996-05-01. It has received 12 citations till now. The article focuses on the topics: Security service & Computer security model.

read more

Citations
More filters
Journal ArticleDOI

Hiding information in a Stream Control Transmission Protocol

TL;DR: This paper identifies and presents the most likely ''places'' where hidden information can be exchanged using an SCTP, and this analysis can be treated as a ''guide'' when developing steganalysis (detection) tools.
Posted Content

Hiding Information in a Stream Control Transmission Protocol

TL;DR: In this paper, a complete analysis of information hiding in Stream Control Transmission Protocol (SCTP) is presented, and this analysis can be used as a "guide" when developing steganalysis (detection) tools.
Patent

Distributed object system and service supply method therein

TL;DR: In this article, the authors present a distributed object system comprising at least one object distributing server, one client terminal and one server object execution server, including an object distribution server for storing an object program to which an electronic signature is affixed; a client terminal including means for downloading the object program from the distribution server, means for verifying the electronic signature affixed to the program, and means for executing the client object program when the completeness of the program is confirmed and the user of the client terminal beforehand permits execution of the application.
Patent

Methods and apparatus for sending electronic data signals

Lee G. Dove
TL;DR: In this article, a request for a time stamp and a location stamp from a user in a transactional flow application is made over an open network such as the Internet, for example from a World Wide Web site.
Journal ArticleDOI

An Integrated Approach to Security on Demand in ATM Networks

TL;DR: A conceptual framework for network security that provides a basis to address, fundamentally, every weakness in a given network and can facilitate electronic commerce by devising fixed routing across networks of known security.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI

Using encryption for authentication in large networks of computers

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Related Papers (5)