Security in IP networks and an authentication server design

Download
1995
Şentürk, Muzaffer

Suggestions

Security and authentication in large computing environments
Göktaş, Ahmet Hakan; Özgit, Atilla; Department of Computer Engineering (1998)
Security of certificate-based protocols: focus on server authentication
Baran, Selim; Özbudak, Ferruh; Selçuk, Ali Aydın; Department of Cryptography (2015)
Today, secure communication channels are mostly set up via certificate-based protocols, such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS). Although they have been used for years and in so many areas, from e-commerce and internet banking to secure channel needs in military, there have been several attacks on their security model, which forced researchers to make studies on them. In this thesis, we will explain their security model, the vulnerabilities discovered so far, the precautions fo...
Security on mobile phones with lightweight cryptographic message syntax
Kubilay, Murat Yasin; Özgit, Attila; Department of Computer Engineering (2007)
Cryptographic Message Syntax (CMS) is a standard for protecting messages cryptographically. Using CMS, messages can be protected in different content types such as signed-data, enveloped-data, digested-data and authenticated-data. CMS is architected around certificate based key management and symmetric cryptography. In this thesis, a lightweight CMS envelope is proposed for the mobile phones which have limited memory and processing power, in order to provide the privacy of the data either stored on them or ...
Security and service quality analysis for cluster-based wireless sensor networks
Tomur, Emrah; Erten, Y. Murat (2007-05-25)
In this study, we analyze security and quality of service (QoS) issues in cluster-based wireless sensor networks (WSN). Taking spatial resolution as the main QoS metric and limiting the security definition to data integrity and authentication, we present a control strategy to maintain desired QoS and security levels during the entire operation of a cluster-based sensor network. Besides, our proposed strategy considers some other WSN QoS attributes such as coverage, packet collision and system lifetime. It p...
Security analysis of electronic signature applications and test suite study
Ergun, Tamer; Özbudak, Ferruh; Department of Cryptography (2013)
Digital signature technology is used widely for security and trust in electronic business and communications. Nowadays it becomes commonly used especially in government agencies. From this point of view, it is crucial to implement correct applications to create and verify digital signatures. CEN (European Commitee for Standardization) has introduced the security requirements for signature applications but neither proposed a PKI model nor implemented a test suite to evaluate the accuracy of signature applica...
Citation Formats
M. Şentürk, “Security in IP networks and an authentication server design,” Middle East Technical University, 1995.