Network Security Defined - Additional Reading

 

Here are a few suggestions for resources with more information about network security.

  • Bellovin, S. M., and M. Merritt. “Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks.” In Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy (1992): 72-84
  • Bellovin, S. M., and M. Merritt. “Limitations of the Kerberos Protocol.” Winter 1991 USENIX Conference Proceedings (1991): 253-267
  • Davies, D. W., and W. L. Price. “The Application of Digital Signatures Based on Public-Key Cryptosystems.” Proceedings of the Fifth International Computer Communications Conference (Oct 1980): 525-530.
  • Davies, D. W., and W. L. Price. Security for Computer Networks, 2d ed. New York: John Wiley & Sons, 1989.
  • Davies, D. W., and W. L. Price. “Digital Signatures — An Update.” From Proceedings of International Computer Communications, Oct. 1984. Sydney, Australia. North Holland: Elsevier Science Publishers, (1985): 843-847.
  • Denning, D. E., and C. M. Sacco. “Timestamps in Key Distribution Protocols.” Communications of the ACM, v.24, n. 8. (Aug 1981): 533-536.
  • Jin, T. Care and Feeding of Your Three-Headed Dog. Document Number IAG-90-11. Hewlett-Packard Corporation (May 1990).
  • Jin, T. Living with Your Three-Headed Dog. Document Number LAG-90-012. Hewlett-Packard Corporation (May 1990).
  • Kohl, J. T. “The Evolution of the Kerberos Authentication Service.” From the EuroOpen Conference Proceedings. (May 1991): 295-313
  • Needham, R. M., and M. D. Schroeder, “Using Encryption for Authentication in Large Networks of Computers.” In Communications of the ACM, v.21, no. 1. (Dec 1978): 993-999
  • B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc. 1994.
  • Sjogren, S. “A Bite Out of LAN Crime ” In INTEROPERABILITY. (Spring 1991). Supplement to LAN Magazine.
  • Steiner, J. G., and B. C. Neauman, J. I. Schiller, and J. H. Saltzer, “Kerberos, An Authentication Service for Open Network Systems.” From USENIX Conference Proceedings. (Feb 1989): 91-202
  • Russell, D., and G.T. Gangemi Sr., Computer Security Basics, O'Reilly & Associates, Inc., 1992.