Telecommunication Network Security
暂无分享,去创建一个
Raed A. Abd-Alhameed | Simon J. Shepherd | Muhammad I. Adeka | R. Abd‐Alhameed | S. Shepherd | Muhammad Adeka
[1] Christopher Hadnagy,et al. Social Engineering: The Art of Human Hacking , 2010 .
[2] Bruce Schneier,et al. Cryptography Engineering - Design Principles and Practical Applications , 2010 .
[3] Indrakshi Ray,et al. Towards a location-based mandatory access control model , 2006, Comput. Secur..
[4] Johnny Long,et al. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing , 2008 .
[5] Man Young Rhee. Cryptography and Secure Communications , 1993 .
[6] Christopher Swenson,et al. Modern cryptanalysis - techniques for advanced code breaking , 2008 .
[7] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[8] Dale K. Pace,et al. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .
[9] Dennis Willetts. Telecommunications security , 1992 .
[10] Gabriele Lenzini,et al. Trust-enhanced Security in Location-based Adaptive Authentication , 2008, Electron. Notes Theor. Comput. Sci..
[11] Thomas F. La Porta,et al. Security for Telecommunications Networks , 2008, Advances in Information Security.
[12] Jochen Schiller,et al. Location Based Services , 2004 .
[13] Tony Bradley,et al. Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security , 2006 .
[14] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[15] Edward F. Gehringer. Choosing passwords: security and human factors , 2002, IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293).
[16] Bruce Schneier,et al. Beyond fear - thinking sensibly about security in an uncertain world , 2003 .
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] Roger J. Sutton. Secure Communications: Applications and Management , 2002 .
[19] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .
[20] M. Adeka,et al. Resolving the password security purgatory in the contexts of technology, security and human factors , 2013, 2013 International Conference on Computer Applications Technology (ICCAT).
[21] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .