Advertisement

Network Security

  • William J. Barksdale
Part of the Applications of Communications Theory book series (ACTH)

Abstract

Computers and computer data networks are becoming increasingly crucial in the day-to-day operation of our modern society. We are fast becoming dependent on networks in such fundamental areas as banking, retailing, law enforcement, education, government administration, and many more. Most people are barely aware of, much less concerned about, the huge amount of their personal information that is accumulating in various government and private data bases, with much of it conceivably accessible via one or more data networks. Although already widespread, this trend toward storing more information in computers, providing more network access to it, and relying more heavily upon it is accelerating and promises to be pervasive in the near future.

Keywords

Block Cipher Network Security Stream Cipher Data Encryption Standard Computer Crime 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    D. Kahn, The Code Breakers, McMillan, New York (1967).Google Scholar
  2. 2.
    Data Encryption Standard (FIPS Pub. 46), National Bureau of Standards, Washington D.C. (1977).Google Scholar
  3. 3.
    C. E. Shannon, Communications theory of secret systems, Bell Syst. Tech. J. 28, 656–715 (1949).MathSciNetMATHGoogle Scholar
  4. 4.
    DES Modes of Operation (FIPS Pub. 81), National Bureau of Standards, Washington, D.C. (1980).Google Scholar
  5. 5.
    W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Trans. Information Theory 22 (6), 644–654 (1976).MathSciNetMATHCrossRefGoogle Scholar
  6. 6.
    R. L. Rivest, A. Shamir, and L. Adleman, On digital signatures and public key cryptosystems, Commun. ACM 21 (2), 120–126 (1978).MathSciNetMATHCrossRefGoogle Scholar
  7. 7.
    D. W. Davies (ed.), The Security of Data in Networks, IEEE Press, New York (1981).Google Scholar
  8. 8.
    W. Diffie and M. E. Hellman, Privacy and authentication: An introduction to cryptography, Proc. IEEE 67 (3), 397–427 (1979).CrossRefGoogle Scholar

Suggested Readings

  1. L. D. Smith, Cryptography the Science of Secret Writing, reprint of 1943 version by Dover, New York (1955).Google Scholar
  2. IEEE Communications Magazine (Special Issue on Communications Privacy) 16(6), (1978).Google Scholar
  3. D. E. Davis (ed.), The Security of Data Networks, IEEE Press, New York (1981).Google Scholar
  4. IEEE Communications Magazine (Special Issue on Computer Security) 23(7), (1985).Google Scholar
  5. M. D. J. Buss and L. M. Salerno, Common sense and computer security, Harvard Business Rev. 62 (2), 112–121 (1984).Google Scholar
  6. Glossary for Computer Systems Security (FIPS Pub. 39), National Bureau of Standards, Washington, D.C. (1976).Google Scholar

Copyright information

© Plenum Press, New York 1986

Authors and Affiliations

  • William J. Barksdale
    • 1
  1. 1.South TEC AssociatesHuntsvilleUSA

Personalised recommendations