Literature for Network Security 2012/2013- Kaufman, Perlman, Speciner: Network Security. 2nd edition. 2002. Chapter 3.3: DES
- Kaufman, Perlman, Speciner: Network Security. 2nd edition. 2002. Chapter 3.5: AES
- Boyd, Mathuria: Protocols for Authentication and Key Establishment. 2003. Ch1.4-1.7, Ch.2.1, Ch. 2.4: Properties of crypto protocols.
- R. Anderson, Security Engineering, 2001 (free!). Chapter 2: Protocols.
- Kaufman, Perlman, Speciner: Network Security. 2nd edition. 2002. Ch. 17: IPSec
- W. Stallings, Cryptography and Network Security, 2003: Chapter 17.2: SSL/TLS
- W. Stallings, Cryptography and Network Security, 2003: Chapter 14.1: Kerberos
- M. Bishop, Computer Security, 2005. Ch. 23.3-23.7: Network organization (firewalls)
Papers- Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler and Jean-Pierre Hubaux. The Inconvenient Truth about Web Certificates. 10th Workshop on the economics of Information Security. 2011.
- Ralph Holz, Lothar Braun, Nils Kammenhuber, and Georg Carle. The SSL Landscape - A Thorough Analysis of the X.509 PKI Using Active and Passive Measurements. In Proc. ACM/USENIX 11th Annual Internet Measurement Conference (IMC '11), Berlin, Germany, November 2011.
- Alexander Ulrich, Ralph Holz, Peter Hauck, and Georg Carle. Investigating the OpenPGP Web of Trust. In Proc. 16th European Symposium on Research in Computer Security (ESORICS 2011), volume 6879/2011 of LNCS, pages 489-507. Springer Verlag, September 2011.
- Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman: Mining your Ps and Qs: Detection of wide-spread weak keys in network devices. Extended version of USENIX 2012 paper.
Further links
|
|