Journal ArticleDOI
Tutorial: Security in computer networks and distributed systems
Mukesh M. Prabhu,S. V. Raghavan +1 more
TLDR
Some of the commonly known security threats, together with the security services and state-of-the-art mechanisms that can be used to provide protection against these threats are introduced.About:
This article is published in Computer Communications.The article was published on 1996-05-01. It has received 12 citations till now. The article focuses on the topics: Security service & Computer security model.read more
Citations
More filters
Journal ArticleDOI
Hiding information in a Stream Control Transmission Protocol
TL;DR: This paper identifies and presents the most likely ''places'' where hidden information can be exchanged using an SCTP, and this analysis can be treated as a ''guide'' when developing steganalysis (detection) tools.
Posted Content
Hiding Information in a Stream Control Transmission Protocol
TL;DR: In this paper, a complete analysis of information hiding in Stream Control Transmission Protocol (SCTP) is presented, and this analysis can be used as a "guide" when developing steganalysis (detection) tools.
Patent
Distributed object system and service supply method therein
Takashi Akaosugi,Tadashi Kaji,Akira Kito,Ryoichi Sasaki,Seiichi Susaki,Kuniaki Tabata,Satoru Tezuka,Katsuyuki Umezawa +7 more
TL;DR: In this article, the authors present a distributed object system comprising at least one object distributing server, one client terminal and one server object execution server, including an object distribution server for storing an object program to which an electronic signature is affixed; a client terminal including means for downloading the object program from the distribution server, means for verifying the electronic signature affixed to the program, and means for executing the client object program when the completeness of the program is confirmed and the user of the client terminal beforehand permits execution of the application.
Patent
Methods and apparatus for sending electronic data signals
TL;DR: In this article, a request for a time stamp and a location stamp from a user in a transactional flow application is made over an open network such as the Internet, for example from a World Wide Web site.
Journal ArticleDOI
An Integrated Approach to Security on Demand in ATM Networks
TL;DR: A conceptual framework for network security that provides a basis to address, fundamentally, every weakness in a given network and can facilitate electronic commerce by devising fixed routing across networks of known security.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI
Using encryption for authentication in large networks of computers
TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Journal ArticleDOI
A logic of authentication
TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.