Chapter 7

Security Projects for Systems and Networking Professionals

Leonidas Deligiannidis1, Charlie Wiseman1, Mira Yun1 and Hamid R. Arabnia2,    1Wentworth Institute of Technology, Boston, MA, USA,    2University of Georgia, Athens, GA, USA

Every day, people interact with numerous computer systems, networks, and services that require the exchange of sensitive data. However, the Internet is a highly distributed system operated by many different entities and as such should not be trusted by end users. Users, whether consumers or businesses, retain no control over how their information is routed among the many networks that comprise the Internet. Therefore, there is a strong need for cryptographic protocols to authenticate, verify trust, and ...

Get Emerging Trends in ICT Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.