Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R., 2001, Security Engineering: A Guide to Building Dependable Distributed Systems, John Wiley & Sons, Inc.
Azenabor, C.E., and Shoniregun, C.A., 2006, Electronic Government Security Issues, In Proceedings of the International Conference of Internet Technology and Secured Transactions (ICITST-2006), London, UK.
Bellowin, S.M., 1989, Security Problems in the TCP/IP Protocol Suite, Computer Communications Review, May.
Danielyan, E., 2004, The Lure of Biometrics. Available At: http://www.cisco.com/warp/public/ 759/ipj_7-1.pdf (24 January 2007)
Kaucher, C., 2004, An Inaugural lecture on biometrics USA, National Defense University, http://www.biometrics.dod.mil/bio101/10.aspx (23 January 2007)
Landwehr, C.E., and Goldschlag, D.M., 1998, Security Issues with Internet Access, In Proceedings of IEEE, Vol. 85, No. 12, December.
Libov, Y., 2004, Biometrics: Technology that Gives You a Password You can’t share, http://www.securitydocs.com/library/1032 (31 January 2007)
Oppliger, R., 1997, ‘Firewalls and Beyond’, Communication of the ACM, May 1997.
Palmgren, K., 2005, Biometric Authentication, An Introduction, http://www.securitydocs.com/library/3003 (3 January 2007)
Shoniregun, C.A., Chochliouros, I.P., Laperche, B., Logvynovskiy, O., and Spiliopoulou-Chochliourou, A., 2004, Questioning The Boundary Issues of Internet Security, e-Centre for Infonomics, London.
Shoniregun, C. A., 2005, Impacts and Risk Assessment of Technology for Internet Security: Enable information Small-medium Enterprises (TEISMEs), Springer New York, USA.
Taylor L., 2002, Understanding IPSec, Intranet Journal
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Shoniregun, C.A. (2007). Discussion. In: Synchronizing Internet Protocol Security (SIPSec). Advances in Information Security, vol 34. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68569-4_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-68569-4_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-32724-2
Online ISBN: 978-0-387-68569-4
eBook Packages: Computer ScienceComputer Science (R0)