Location of Repository

Conventional Cryptography

By Stallings Prentice Hall

Abstract

A comprehensive study of security vulnerabilities in information systems and the basic techniques for developing secure applications and practicing safe computing. Topics including Common attacking techniques such as buffer overflow, Trojan, virus, etc. Operating Systems security. Conventional encryption. Hash functions and data integrity. Public-key encryption. Digital signature. Security standards and applications. Building secure software and systems

Year: 2011
OAI identifier: oai:CiteSeerX.psu:10.1.1.190.6076
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.utdallas.edu/%7Eeds... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.