- 1 Chapman, D. and Zwicky, E. Internet Security Firewalls. O'Reilly, Sebastopol, Calif., 1995.Google Scholar
- 2 Cheswick, W., and Bellovin, S. Firewalls and Internet Security: Repelling the Wiley Hacker. Addison-Wesley, Reading, Mass., 1994. Google ScholarDigital Library
- 3 IEEE. Local and Metropolitean Area Networks: Interoperable LAN/MAN Security (SILS). IEEE Std 802.10, 1990.Google Scholar
- 4 Kent, S. Internet privacy enhanced mail. Common. ACM 36, 8 (Aug. !993), 48-60. Google ScholarDigital Library
- 5 Morris, R. A Weakness in the 4.2BSD UNIX TCP/IP Software. Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, N J, Feb. 1985.Google Scholar
- 6 Oppliger, R. Authentication and key distribution in computer networks and distributed systems. In Communications and M~ltimedia Security. R. Posch, Ed. Chapman & Hall, London, UK, 1995.Google Scholar
- 7 Oppliger, R. Internet Kiosk: Internet security enters the Middle Ages. IEEE Comp~t. 28, 10 (Oct. 1995), 100-101. Google ScholarDigital Library
- 8 Oppliger, R. Authentication Systems for Secure Networks. Artech Home, Norwood, Mass. 1996. Google ScholarDigital Library
- 9 Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley, New York, 1994. Google ScholarDigital Library
- 10 Spafford, E. The Internet worm: Crisis and aftermath. Common. ACM 32, 6 (June 1989), 678-688. Google ScholarDigital Library
- 11 Tsudik, G. Message authentication with one-way hash functions. ACM Computer Communication Review 22, 5 (1992), 29-38. Google ScholarDigital Library
- 12 Wagner, D., and Bellovin, S. A "bump in the stack" encryptor for MS- DOS systems. In Proceedings of the Internet Society Symposium on Network and Distributed System Security (Feb. 1996). Google ScholarDigital Library
Index Terms
Internet security: firewalls and beyond
Recommendations
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Internet of things security: challenges and perspectives
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud ComputingNo one can deny that the Internet of Things (IOT) will revolutionize our daily thanks to its many benefits in order to improve and simplify people's lives. Us any new technology the internet of things has a number of problems that prevents it to reach ...
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
Comments