Tìm kiếm tài liệu miễn phí

An ninh - Bảo mật (5.232)

Intrusion detection system based on 802.11 specific attacks

The resulting detectors were efficient and accurate in detecting network attacks at the network and transport layers, but unfortunately, not capable of detecting 802.11-specific attacks such as deauthentication attacks or MAC layer DoS attacks.


DOS attacks on TCP/IP layers in WSN

In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of the major threats against WSN security. Further, various DoS attacks on different layers of OSI are proposed.


An advance security technique challenges to government in wireless sensor network for health

In this paper, we outline prototype systems spanning application domains from physiological and activity monitoring the urban and rural hospitals and behavioral works and emphasize ongoing treatment challenges to the patient day to day and that information will be available in centrally. Then any moments the higher authorities can able to verify.


The security of information in financial transactions via mobile: Algorithms

Toolkit SIM applications are identified and described in this article based on a systematic review. In addition, there are some recommendations regarding to suit different situations to implement a particular algorithm for this issue. More results are subsequently explained in this paper.


Cryptosystem an implementation of RSA using verilog

In this paper, we present a new structure to develop 64-bit RSA encryption engine on FPGA that can be used as a standard device in the secured communication system. The RSA algorithm has three parts i.e. key generation, encryption and decryption. The algorithm also requires random prime numbers so a primality tester is also design to meet the needs of the algorithm. We use right-to-left-binary method for the exponent calculation.


A practical and extendible vanets privacypreserving system

In this paper, we introduce a practical VANETs Privacy-Preserving System which aims to the prior location and identity privacy protecting. We propose the architecture and do some close analysis about that.


Intelligent public transport system with information forensics and security

In this System passenger can get information about all buses, routes, timings of buses and all stops in any particular route. This system includes two phases. One is for user and other for administrator. At user side, user can request for information about all buses, routes, timings of buses and all stops in any particular route using Wi-Fi or GPRS technology from his mobile or PDA.


Various authentication tecniques for security enhancement

Keeping in the view, the importance of the authentication systems, we analyze various authentication techniques in our paper. And try to find out various advantages and disadvantages of various authentication systems. This paper gives the emphasis on the various issues involved in the various authentication techniques.


Phát hiện lọc bỏ nhanh các gói tin giả mạo trong tấn công mạng TCP SYN Flood

Trong nghiên cứu này, đề xuất một thuật toán phát hiện và lọc bỏ nhanh các gói tin giả mạo mà sử dụng rất ít tài nguyên hệ thống và đạt tỷ lệ phát hiện rất cao.


Ebook Mobile application security

(BQ) Chapters will allow you to fully grasp many of the technical issues introduced in the top 15 list as well as a few new ones. For example, although SMS is not a mobile application, it is used heavily by many mobile applications today, even for security purposes.


Ebook Hacking for dummies

(BQ) Ebook Hacking for dummies (new version) provides you with the knowledge to implement an ethical hacking program successfully along with countermeasures that you can put in place to keep external hackers and malicious users out of your business.


Ebook Buffer overflow attacks

(BQ) This book on buffer overflows can’t deliver that hacker high with knowledge alone. Work along with the chapters and you’ll find that you can’t stop fiddling with your exploit when it’s not working right.You’ll give up food, sleep, or money to make it that much cleaner. My belief is this: In the end, an exploit is a complex statement of truth.


Ebook Hacking: Computer hacking for beginners, how to hack, and understanding computer security

(BQ) This book covers the topic of Computer hacking, what it is, and how you can learn to hack. You will learn about the difference between white hat and black hat hacking, and be given some information on how to secure yourself against hackers.


Ebook Xss attacks: Cross site scripting attacks xss exploits and defense

(BQ) The JavaScript programming language hit the scene, an unknown harbinger of cross-site scripting, which changed the Web applicaation security landscape forever. JavaScript enabled Web developers to create interactive Web page effects including image rollovers, floating menus, and the despised pop-up window.


Ebook No tech hacking: A guide to social egineering dumpster diving, and shoulder surfing

(BQ) In this book Johnny presents eye-opening exploits that security professionals must take into consideration. In their haste to complete tasks and move along to the next topic, many security managers are overlooking simple fl aws that render their high-dollar technologies, useless.


Ebook Hacking: How to hack computer - Basic security and penetration testing

(BQ) This book contains proven steps and strategies on how to have better security when it comes to using your computer and making sure that it is protected against malicious hackers.


Ebook Hacking: Beginner's to intermediate how to hack guide to computer hacking, penetration testing and basic security

(BQ) This book, give you an overview of hacking and penetration testing, show you how it’s done, and then I’m going to tell you how to keep your systems secure so that you can’t be hacked!


Ebook Asterisk hacking

Ebook Asterisk hacking include: Chapter 1 - What is asterisk and why do you need it?; chapter 2 - Setting up asterisk; chapter 3 - Configuring asterisk; chapter 4 - Writing applications with asterisk.


Bài giảng Tội phạm máy tính

"Bài giảng Tội phạm máy tính" có nội dung trình bày về khái niệm về tội phạm trong lĩnh vực CNTT, thực trạng tội phạm trong lĩnh vực CNTT, cơ sở pháp lý về tội phạm trong lĩnh vực CNTT, các hình thức phạm tội trong lĩnh vực CNTT, những vấn đề đặt ra của tội phạm trong lĩnh vực CNTT.


Lecture Data security and encryption - Lecture 6: Block ciphers and the data encryption standard

The objective of this chapter is to illustrate the principles of modern symmetric ciphers. For this purpose, we focus on the most widely used symmetric cipher: the Data Encryption Standard (DES). Although numerous symmetric ciphers have been developed since the introduction of DES, and although it is destined to be replaced by the Advanced Encryption Standard (AES), DES remains the most important such algorithm.


Lecture Data security and encryption - Lecture 5: Data security and encryption

This chapter presents the following content: Classical cipher techniques and terminology, monoalphabetic substitution ciphers, cryptanalysis using letter frequencies, playfair cipher, polyalphabetic ciphers, transposition ciphers, product ciphers and rotor machines, stenography.


Lecture Data security and encryption - Lecture 13: Block Cipher Operation

The contents of this chapter include all of the following: multiple encryption & DES, why not double-DES? triple-DES with two-keys, modes of operation, electronic codebook book (ECB), advantages and limitations of ECB, cipher block chaining (CBC).


Lecture Data security and encryption - Lecture 32: Review 16-30

The contents of this chapter include all of the following: RSA, RSA En/decryption, Diffie-Hellman key exchange, man-in-the-middle attack, ElGamal cryptography, ElGamal message exchange, hash function, secure hash algorithm, SHA-3 requirements,...


Lecture Data security and encryption - Lecture 8: Data encryption standard (DES)

This chapter presents the following content: Data encryption standard (DES) strengths of DES, differential & linear cryptanalysis, block cipher design principles, differential & linear cryptanalysis, block cipher design principles.


Lecture Data security and encryption - Lecture 22: User Authentication

The contents of this chapter include all of the following: Remote user authentication issues, authentication using symmetric encryption, the Kerberos trusted key server system, authentication using asymmetric encryption, federated identity management.


Lecture Data security and encryption - Lecture 31: Review 1-15

The contents of this chapter include all of the following: Symmetric ciphers, asymmetric ciphers, cryptographic data integrity algorithms, mutual trust, network security and internet security, system security, legal and ethical issues.


Lecture Data security and encryption - Lecture 19: Message Authentication

The contents of this chapter include all of the following: Message authentication requirements, message authentication using encryption, MACs, HMAC authentication using a hash function, CMAC authentication using a block cipher, pseudorandom number generation (PRNG) using Hash Functions and MACs.


Lecture Data security and encryption - Lecture 10: AES

This chapter presents the following content: The AES selection process; The details of Rijndael – the AES cipher; looked at the steps in each round; out of four AES stages, two are discussed; substitute bytes; shift rows.


Lecture Data security and encryption - Lecture 17: Other Public Key Cryptosystems

The contents of this chapter include all of the following: Diffie-Hellman key exchange, ElGamal cryptography, Elliptic curve cryptography, Pseudorandom Number Generation (PRNG) based on Asymmetric Ciphers.


Lecture Data security and encryption - Lecture 28: Firewalls

The contents of this chapter include all of the following: Firewalls; types of firewalls; packet-filter, stateful inspection, application proxy, circuit-level; Basing; bastion, host, personal; location and configurations; DMZ, VPN, distributed, topologies.


Tài liệu mới download

Từ khóa được quan tâm

Có thể bạn quan tâm

ethics
  • 28/01/2013
  • 26.304
  • 182
Tìm hiểu tường lửa
  • 15/08/2010
  • 64.243
  • 232
Chapter 5 - Thủ tục mật mã
  • 15/10/2010
  • 10.450
  • 916
The IP Behavior
  • 07/08/2009
  • 34.292
  • 755

Bộ sưu tập

Danh mục tài liệu