Reading Materials for Presentation

advertisement
SUGGESTED READING
ASSIGNMENTS
NETWORK SECURITY
ESSENTIALS
FIFTH EDITION
WILLIAM STALLINGS
Copyright 2013: William Stallings
Chapter 1
Introduction
Why Cryptography Is Harder Than It Looks by Bruce Schneier
1997
A Contemporary Look at Saltzer and Schroeder's 1975 Design Principles
IEEE Security and Privacy, November/December 2012
Chapter 2
Symmetric Encryption and Message
Confidentiality
Tiny Encryption Algorithm
Cryptologia july 1997
The Block Cipher Square
Proceedings, Fast Software Encryption 1997
Block Chaining Modes of Operation
Department of Informatics, U. of Bergen
October 2000
RFC 4086 Randomness Recommendations for Security
June 2005
Software Generation of Practically Strong Random Numbers
P. Gutman
Proceedings of the 7th USENIX Security Symposium
San Antonio, Texas, January 26-29, 1998
Chapter 3
Public-Key Cryptography and Message
Authentication
Asymmetric Encryption: Evolution and Enhancements
Cryptobytes Volume 2, No. 1 – Spring 1996 (pdf, 210k)
Elliptic-Curve Cryptography
ACM Ubiquity, May 2008
Tiger: A Fast New Hash Function,
Fast Software Encryption 3, 1996, LNCS 1039
A Logic of Authentication, SRC Research Report 39
ACM Transactions on Computer Systems, February 1990
Akl, S. "Digital Signatures: A Tutorial Survey." Computer, February 1983
Achieving Electronic Privacy
by David Chaum Scientific American, August 1992
-2-
Chapter 4
Key Distribution and User Authentication
A SURVEY OF KEY MANAGEMENT IN AD HOC NETWORKS
IEEE Communications Surveys, 3rd Quarter 2006
Kerberos: An Authentication Service for Open Network Systems. In
Proceedings of the Winter 1988 Usenix Conference. February, 1988
J. G. Steiner, B. Clifford Neuman, and J.I. Schiller.
Yu, T., et al. "The Perils of Unauthenticated Encryption: Kerberos Version
4." Proceedings of the Network and Distributed System Security
Symposium. The Internet Society, February 2004
Chapter 5 Network Access Control and Cloud Security
Whatever Happened to Network-Access-Control Technology?
David Geer
Computer, September 2010
The Cloud’s Infrastructure Needs More Than A Silver Lining
Bill Wong
Electronic Design June 2012
Chapter 6 Transport-Level Security
Architectural Defects of the Secure Shell
Proceedings of the 13th International Workshp on Database and Expert
Systems Applications, 2002
Chapter 7 Wireless Network Security
Michael: an improved MIC for 802.11 WEP
IEEE 802.11 working paper, January 17, 2002
Mobile Security Catching Up?
Revealing the Nuts and Bolts of the Security of Mobile Devices
2011 IEEE Symposium on Security and Privacy
Chapter 8 Email Security
Internet Messaging Frameworks
IBM Systems Journal, Volume 37, Number 1
Chapter 9 IP Security
IPv6 Security Challenges
Computer February 2009
IBM Systems Journal, No. 1, 1998
-3-
Chapter 10 Malicious Software
Levine, J.; Grizzard, J.; and Owen, H. "A Methodology to Detect and
Characterize Kernel Level Rootkit Exploits Involving Redirection of the
System Call Table." Proceedings, Second IEEE International Information
Assurance Workshop, 2004
Chapter 11 Intruders
Steven M. Bellovin. There Be Dragons. A description of cracker assaults
vs. the ramparts of ATT.COM. August 15, 1992.
Bass, T. "Intrusion Detection Systems." Communications of the ACM, April
2000.
Chapter 12
Firewalls
Ioannidis, S. "Implementing a Distributed Firewall." ACM CCS '00, 2000.
Guster, D "A Firewall Configuration Strategy for the Protection of Computer
Networked Labs in a College Setting." Journal of Computing Sciences in
Colleges, October 2001.
-4-
Download