Network Security Essentials

Reading list

 
 

Compulsory reading

Supplementary reading

  1. R. Shirey, Internet Security Glossary, Internet Society, RFC 2828, May 2000.
  2. X.800. Security Architecture for Open Systems Interconnection for CCITT Applications, ITU 1991.
  3. William Stallings, The Advanced Encryption Standard, Cryptologia, 26:3, 165-188 (2002).
  4. William Stallings and Lawrie Brown, Computer Security: Principles and Practice, 2/e Prentice Hall, ISBN-10: 0132775069 (2011). Chapter 14, 18, 25, and 26.
  5. N. Borisov, I. Goldberg, and D. Wagner, Intercepting mobile communications: the insecurity of 802.11, MobiCom '01 Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 180-189, 2001. Available from Statsbiblioteket.
  6. S. Fluhrer, I. Mantin and A. Shamir, Weaknesses in the Key Scheduling Algorithm of RC4, Lecture Notes in Computer Science, 2001, Volume 2259/2001, pp.1-24. Available from SpringerLink.
  7. A. Stubblefield, J. Ioannidis, and A.D. Rubin, Using the Fluhrer, Mantin, and Shamir attack to break WEP, AT&T Labs Technical Report TD-4ZCPZZ, 2001. Availble via Google Scholar.
  8. E. Tews and M. Beck, Practical attacks against WEP and WPA, WiSec '09 Proceedings of the second ACM conference on Wireless network security, pp. 79-86. Available from Statsbiblioteket.
 

[Home] [Plan] [Exercises] [Projects]

Copyright 2012, Aarhus University School of Engineering.
Course responsible: Associate Professor Rune Hylsberg Jacobsen