Teacher Rebecca Montanari. Credits 8. Teaching Mode Traditional lectures. Language Italian. Course Timetable from Sep 23, to Dec 16,

Author:Kahn Kir
Language:English (Spanish)
Published (Last):13 July 2016
PDF File Size:17.36 Mb
ePub File Size:5.90 Mb
Price:Free* [*Free Regsitration Required]

Generating and Counting Binary Bent Sequences. Digital Signatures: A Tutorial Survey. Computer Security Threat Monitoring and Surveillance.

Anderson Co. Intrusion Detection. Intrusion Detection Systems. Limitations of the Kerberos Authentication System. There Be Dragons. Packets Found on an Internet. Computer Communications Review, July Network Firewalls.

Keying Hash Functions for Message Authentication. An expanded version is available at cse. Algebraic Coding Theory. Differential Cryptanalysis of the Data Encryption Standard. Elliptic Curves in Cryptography. Collisions for the Compression Function of MD5.

Fast Hashing on the Pentium. Project Athena document, February Available at mit. A Pathway to Number Theory. Proof that DES is not a Group. Anatomy of Malice. Building Internet Firewalls. Sebastopol, CA: O Reilly, A Security Architecture for the Internet Protocol.

The Future of Viruses on the Internet. A Note on Non-Secret Encryption. A Short Course on Computer Viruses. Prime Numbers: A Computational Perspective. Rijndael: The Advanced Encryption Standard. A Design Principle for Hash Functions. Security for Computer Networks. Timestamps in Key Distribution Protocols. Cryptography and Data Security. Protecting Public Keys and Signature Keys.

An Intrusion-Detection Model. Abstract Algebra. New Directions in Cryptography. Multiuser Cryptographic Techniques. Privacy and Authentication: An Introduction to Cryptography. The History of Non-Secret Encryption. Computer Security. Elliptic Curves and Their Applications to Cryptography. Cryptography and Computer Privacy. Elliptic Curve Cryptography. Advances in Public-Key Certificate Standards.

Computer Immunology. Demystifying the IPSec Puzzle. The Goods on Hacker Hoods. Principles of Key Management. Codes, Ciphers, and Secret Writing. Building a Secure Computer System. The Omega Files. Network World, June 26, Variations on the Themes of Message Freshness and Replay. The Art of Probability for Scientists and Engineers. Viruses Revealed. Data and Image Compression: Tools and Techniques. Topics in Algebra. Some Techniques for Handling Encipherment Keys.

Message Authentication. Electronic Document Authentication. Elliptic Curves and Cryptography. CryptoBytes, Autumn Multiple Encryption: Weighing Security and Performance. Timing Attacks on Cryptosystems. Cryptanalytic Attacks on Pseudorandom Number Generators. On the Trail of Intrusions into Information Systems. Fighting Computer Viruses. Blueprint for a Computer Immune System.

Analysis Method for Alledged RC4. A Course in Number Theory and Cryptography. Towards a Practical Public-Key Cryptosystem. Bachelor s Thesis, M.

The Evolution of the Kerberos Authentication Service. Distributed Open Systems. Cryptography: A Primer. The Pleasures of Counting. Number Theory with Computer Applications. LAM92b Lam, K. Timely Authentication in Distributed Systems. LE93 Le, A. Mathematical Methods in Large-Scale Computing. Elementary Theory of Numbers. Cryptological Mathematics. Introduction to Finite Fields and Their Applications. CTR Mode Encryption. Firewalls Fend Off Invasions from the Net.

World Record in Password Checking. Usenet, comp. Internet Security Protocol. Key Handling with Control Vectors. The Role of Intrusion Detection Systems. Code Red for the Web. Scientific American, October Handbook of Applied Cryptography. Secrecy, Authentication, and Public Key Systems. On the Security of Multiple Encryption.

Riemann s Hypothesis and Tests for Primality.


Crittografia e sicurezza delle reti

Funktion und Design. Business Data Communications. Business data communications. Business Data Communications, Fourth Edition. Business Data Communications: International Edition.


Crittografia E Sicurezza Delle Reti



72942 - Information Security M


Related Articles