Chapter
Licensed
Unlicensed
Requires Authentication
Chapter 12 Internet Security Services
-
Sarhan M. Musa
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xix
- Acknowledgments xxiii
- Chapter 1 Overview of Computer Networks 1
- Chapter 2 Mathematical Foundations for Computer Networks 31
- Chapter 3 Overview of Cryptography 111
- Chapter 4 Mathematical Foundations for Cryptography 139
- Chapter 5 Classical Cipher Schemes 199
- Chapter 6 Modern Symmetric Ciphers 219
- Chapter 7 Public-Key Cryptography for Data Confidentiality 291
- Chapter 8 Authentication Schemes 337
- Chapter 9 Centralized Authentication Service 391
- Chapter 10 Public Key Infrastructure (PKI) 409
- Chapter 11 Pretty Good Privacy 419
- Chapter 12 Internet Security Services 435
- Chapter 13 System Security. 477
- Chapter 14 Security of Emerging Technology 489
- Bibliography 539
- Index 547
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xix
- Acknowledgments xxiii
- Chapter 1 Overview of Computer Networks 1
- Chapter 2 Mathematical Foundations for Computer Networks 31
- Chapter 3 Overview of Cryptography 111
- Chapter 4 Mathematical Foundations for Cryptography 139
- Chapter 5 Classical Cipher Schemes 199
- Chapter 6 Modern Symmetric Ciphers 219
- Chapter 7 Public-Key Cryptography for Data Confidentiality 291
- Chapter 8 Authentication Schemes 337
- Chapter 9 Centralized Authentication Service 391
- Chapter 10 Public Key Infrastructure (PKI) 409
- Chapter 11 Pretty Good Privacy 419
- Chapter 12 Internet Security Services 435
- Chapter 13 System Security. 477
- Chapter 14 Security of Emerging Technology 489
- Bibliography 539
- Index 547