Further Readings

  1. Adams C and Farrell S (1999) Internet X.509 Public Key Infrastructure: Certificate Management Protocols. RFC 2510.
  2. Adida B (2008) Helios: web-based open-audit voting. In Proceedings of the 17th Conference on Security Symposium, pp. 335–348.
  3. Agrawal M, Kayal N, and Saxena N (2004) PRIMES is in P. Annals of Mathematics 160(2):781–793.
  4. Allen J (2001) The CERT Guide to System and Network Security Practices. Addison-Wesley, Massacusetts.
  5. Arkin O and Yarochkin F (2002) Xprobe v2.0: A “Fuzzy” Approach to Remote Active Operating System Fingerprinting, http://www.xprobe2.org+.
  6. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson, Z, and Song D (2007) Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communication Security. ACM, New York.
  7. Bace R (2000) Intrusion Detection. Macmillan Technical Publishing, Indiana.
  8. Bace R and Mell P (2001) Intrusion Detection Systems. NIST Special Publication 800–31. http://www.csrc.nist.gov/publications/nistpubs/800-31/sp800-31.pdf.
  9. Baronti P, Pillai P, Chook V W, Chessa S, Gotta A, and Hu Y F (2007) Wireless sensor networks: a survey on the state of the art and the 802.15. 4 and ZigBee standards. Computer communications 30(7):1655–1695.
  10. Barreto P and Rijmen V (2003) The WHIRLPOOL Hashing Function.
  11. Barrett D, Silverman R, and Byrnes R (2005) SSH: The Secure Shell (The Definitive Guide). 2nd ed. O'Reilly, California.
  12. Barta M, Bonnell J, Enfield A, Esposito D, Francis B, Harrison ...

Get Introduction to Network Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.