This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Barrett, D. J., and Silverman, R.E., 2001, SSH: The Secure Shell, The Definitive Guide, O’Reilly & Associates.
Benbasat, I., Goldstein, D. K., and Mead, M., 1987, The Case Research Strategy in Studies of Information Systems, MIS Quarterly, Sept, pp 369-386.
Diffie, W. and Hellman, M.E., 1976, New Directions in Cryptography, IEEE Transactions on Information Theory, Vol IT-22, No. 6, November.
Huston. B., 2002, A Higher view of Defense in Depth, www.itworld.comh/nl/securitystrat/02202002/ (February 20, 2002).
Menezes, A.J., 19997, Elliptic Curve Public Key Cryptosystems, Fourth Printing, Kluwer Academic Publishers.
Ross, A.A., (2003), Ph D Thesis: Information Fusion in Fingerprint Authentication, Michigan State University, http://biometrics.cse.msu.edu /publications.html/genbio (9 February 2007).
Schneier, B., 1998, Applied Cryptography, 2nd Edition, John Wiley & Sons Inc.
Shoniregun, C.A. 2005, Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES), Springer-Verlag.
Tian. Y., and Bolle, R, M., 2003, Automatic Detecting Neutral Face for Face Authentication and Facial Expression Analysis, issue24 March.
Yin, R., (1994) ‘Case Study Research, Design and Method’, London: Sage
Ylonen, T., and Moffat, D., 2002, SSH Authentication Protocol, Network Working group, Internet Draft, September.
Ylonen, T., and Moffat, D., 2003, SSH Protocol Architecture, Network Working group, Internet Draft, October.
Zikmund, 1997, Business Research Methods, 5th Ed, Sydney: The Dryden Press.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Shoniregun, C.A. (2007). Synchronising Internet Protocol Security (SIPSEC) Model. In: Synchronizing Internet Protocol Security (SIPSec). Advances in Information Security, vol 34. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68569-4_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-68569-4_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-32724-2
Online ISBN: 978-0-387-68569-4
eBook Packages: Computer ScienceComputer Science (R0)