Academic literature on the topic 'Firewalls (Computer security) Computer networks Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewalls (Computer security) Computer networks Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Firewalls (Computer security) Computer networks Cryptography"
Prakash N Kalavadekar, Mr, and Dr Shirish S. Sane. "Effect of Mutation and Crossover Probabilities on Genetic Algorithm and Signature Based Intrusion Detection System." International Journal of Engineering & Technology 7, no. 4.19 (November 27, 2018): 1011. http://dx.doi.org/10.14419/ijet.v7i4.19.28277.
Full textAnas Aljarah, Ghaith Alomari,. "Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2039–44. http://dx.doi.org/10.17762/turcomat.v12i6.4807.
Full textCheng, Haosu, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen, and Jingdong Bian. "A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN." Security and Communication Networks 2018 (November 15, 2018): 1–20. http://dx.doi.org/10.1155/2018/8392080.
Full textMenkus, Belden. "Firewalls in Information Systems Security." EDPACS 23, no. 3 (September 1995): 9–15. http://dx.doi.org/10.1080/07366989509451685.
Full textCastro, Julio César Hernández, and Pedro Isasi Viñuela. "Evolutionary Computation in computer security and cryptography." New Generation Computing 23, no. 3 (September 2005): 193–99. http://dx.doi.org/10.1007/bf03037654.
Full textNiemiec, M., and A. R. Pach. "Management of security in quantum cryptography." IEEE Communications Magazine 51, no. 8 (August 2013): 36–41. http://dx.doi.org/10.1109/mcom.2013.6576336.
Full textRahneva, Darina, Vanya Stoykova, Angelina Cherneva, and Krum Videnov. "VIRTUAL LABORATORY for NETWORK AND COMPUTER SECURITY." International Conference on Technics, Technologies and Education, no. 1 (2018): 315–22. http://dx.doi.org/10.15547/ictte.2018.08.003.
Full textHussain, Iqtadar, Fawad Ahmed, Umar M. Khokhar, and Amir Anees. "Applied Cryptography and Noise Resistant Data Security." Security and Communication Networks 2018 (December 2, 2018): 1–2. http://dx.doi.org/10.1155/2018/3962821.
Full textZaz, Youssef, Lhoussain El Fadil, and Mohamed El Kayyali. "Securing EPR Data Using Cryptography and Image Watermarking." International Journal of Mobile Computing and Multimedia Communications 4, no. 2 (April 2012): 76–87. http://dx.doi.org/10.4018/jmcmc.2012040106.
Full textSingh, Dilbag. "Establishing security of Bitcoins using elliptic-curve cryptography-based protocol." International Journal of Internet Technology and Secured Transactions 11, no. 3 (2021): 1. http://dx.doi.org/10.1504/ijitst.2021.10036589.
Full textDissertations / Theses on the topic "Firewalls (Computer security) Computer networks Cryptography"
Savacool, Richard. "Firewall resistance to metaferography in network communications /." Online version of thesis, 2010. http://hdl.handle.net/1850/12272.
Full textRumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.
Full textFarley, Ryan Joseph. "Parallel firewall designs for high-speed networks /." Electronic thesis, 2005. http://etd.wfu.edu/theses/available/etd-12142005-194043/.
Full textFelker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FFelker.pdf.
Full textAtkins, William Dee. "Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Final_Thesis_09007dcc8031d3b0.pdf.
Full textVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
Asarcıklı, Şükran Tuğlular Tuğkan. "Firewall monitoring using intrusion detection systems/." [s.l.]: [s.n.], 2005. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000390.pdf.
Full textFelker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/852.
Full textThe progression of technology is continuous and the technology that drives interpersonal communication is not an exception. Recent technology advancements in the areas of multicast, firewalls, encryption techniques, and bandwidth availability have made the next level of interpersonal communication possible. This thesis answers why collaborative environments are important in today's online productivity. In doing so, it gives the reader a comprehensive background in distributed collaborative environments, answers how collaborative environments are employed in the Department of Defense and industry, details the effects network security has on multicast protocols, and compares collaborative solutions with a focus on security. The thesis ends by providing a recommendation for collaborative solutions to be utilized by NPS/DoD type networks. Efficient multicast collaboration, in the framework of security is a secondary focus of this research. As such, it takes security and firewall concerns into consideration while comparing and contrasting both multicast-based and non-multicast-based collaborative solutions.
Tang, Wai-hung. "An anonymity scheme for file retrieval systems." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B40887972.
Full textGivens, Mark Allen. "Modeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth posture." Thesis, View thesis View thesis via DTIC web site, 2004. http://handle.dtic.mil/100.2/ADA427180.
Full textTitle from title screen (viewed Mar. 15, 2005). "September 2004." "ADA427180"--URL. Includes bibliographical references (p. 89-90). Also issued in paper format.
Snyder, Walter C. "Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /." Online version of thesis, 2010. http://hdl.handle.net/1850/12263.
Full textBooks on the topic "Firewalls (Computer security) Computer networks Cryptography"
Stewart, James Michael. Network security firewalls & VPNs. Sudbury, MA: Jones & Bartlett Learning, 2010.
Find full textB, Oakes Edward, ed. Firewalls and VPNs: Principles and practices. Upper Saddle River, N.J: Pearson Prentice Hall, 2005.
Find full textVacca, John R. Firewalls clearly explained. 2nd ed. San Francisco, Calif: Morgan Kaufmann, 2000.
Find full textPreetham, V. V. Internet security and firewalls. Cincinnati, Ohio: Premier Press, 2002.
Find full textRonald, Sharp, ed. PCWeek Intranet and Internet firewalls strategies. Emeryville, Calif: Ziff-Davis Press, 1996.
Find full textBook chapters on the topic "Firewalls (Computer security) Computer networks Cryptography"
Verschuren, Jan. "Security of Computer Networks." In State of the Art in Applied Cryptography, 163–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49248-8_7.
Full textSiedlecka-Lamch, Olga, Miroslaw Kurkowski, and Jacek Piatkowski. "Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption." In Computer Networks, 107–17. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39207-3_10.
Full textWaleffe, Dominique, and Jean-Jacques Quisquater. "Better login protocols for computer networks." In Computer Security and Industrial Cryptography, 50–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57341-0_55.
Full textAchenbach, Dirk, Jörn Müller-Quade, and Jochen Rill. "Synchronous Universally Composable Computer Networks." In Cryptography and Information Security in the Balkans, 95–111. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29172-7_7.
Full textMatted, Sushmita, Gori Shankar, and Bharat Bhushan Jain. "Enhanced Image Security Using Stenography and Cryptography." In Computer Networks and Inventive Communication Technologies, 1171–82. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9647-6_93.
Full textPathak, Bageshree, Darshana Pondkule, Rasika Shaha, and Apurva Surve. "Visual Cryptography and Image Processing Based Approach for Bank Security Applications." In Second International Conference on Computer Networks and Communication Technologies, 292–98. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37051-0_34.
Full textYu, William Emmanuel, and Pierre Tagle. "Cryptography Enabled Security Guarantees for over the Top Networks Using GSM Short Messaging Service." In Recent Advances in Computer Science and Information Engineering, 647–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25769-8_91.
Full textHadi, Ali H., and Hussein Al-Bahadili. "A Hybrid Port-Knocking Technique for Host Authentication." In Simulation in Computer Network Design and Modeling, 336–57. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch016.
Full textSinha, Keshav, Partha Paul, and Amritanjali. "Network Security Approaches in Distributed Environment." In Computational Intelligence in the Internet of Things, 174–209. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7955-7.ch008.
Full textSinha, Keshav, Partha Paul, and Amritanjali. "Network Security Approaches in Distributed Environment." In Research Anthology on Artificial Intelligence Applications in Security, 1370–98. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch061.
Full textConference papers on the topic "Firewalls (Computer security) Computer networks Cryptography"
Ali, Shaukat, Shah Khusro, and Azhar Rauf. "A cryptography-based approach to web mashup security." In 2011 International Conference on Computer Networks and Information Technology (ICCNIT). IEEE, 2011. http://dx.doi.org/10.1109/iccnit.2011.6020907.
Full textAhmed, Muhammad Hammad, Syed Wasi Alam, Nauman Qureshi, and Irum Baig. "Security for WSN based on elliptic curve cryptography." In 2011 International Conference on Computer Networks and Information Technology (ICCNIT). IEEE, 2011. http://dx.doi.org/10.1109/iccnit.2011.6020911.
Full textEl Hafez Bakr, Mohamed Abd, Mohamed Amr Mokhtar, and Ali El Sherbini Takieldeen. "Modified Elliptic Curve Cryptography in Wireless Sensor Networks Security." In 2018 28th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2018. http://dx.doi.org/10.1109/iccta45985.2018.9499173.
Full textNawari, Mustafa, Hazim Ahmed, Aisha Hamid, and Mohamed Elkhidir. "FPGA based implementation of elliptic curve cryptography." In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368282.
Full textArokiaraj, A. Rex Macedo, and A. Shanmugam. "ACS: An efficient address based cryptography scheme for Mobile ad hoc networks security." In 2008 International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2008. http://dx.doi.org/10.1109/iccce.2008.4580567.
Full textHuang, Xu, Dharmendra Sharma, Sio-Iong Ao, Hideki Katagir, Li Xu, and Alan Hoi-Shou Chan. "Elliptic Curve Cryptography with Security System in Wireless Sensor Networks." In IAENG TRANSACTIONS ON ENGINEERING TECHNOLOGIES VOLUME 5: Special Edition of the International MultiConference of Engineers and Computer Scientists 2009. AIP, 2010. http://dx.doi.org/10.1063/1.3510575.
Full textBabu, Ch Ratna, M. Sridhar, and B. R. Babu. "Information hiding in gray scale images using pseudo-randomized visual cryptography algorithm for visual information security." In 2013 International Conference on Information Systems and Computer Networks (ISCON 2013). IEEE, 2013. http://dx.doi.org/10.1109/iciscon.2013.6524202.
Full textDe Oliveira Burger Monteiro Luiz, Eduardo, Alessandro Copetti, Luciano Bertini, and Juliano Fontoura Kazienko. "Intrusion Detection System for AES Encripted Low-Power IoT Networks." In Computer on the Beach. São José: Universidade do Vale do Itajaí, 2021. http://dx.doi.org/10.14210/cotb.v12.p392-399.
Full text