Rutuja Patil | Shivaji University, Kolhapur, India (original) (raw)

Papers by Rutuja Patil

Research paper thumbnail of Cryptography and data security

Data security is the science and study of methods of protecting data in computer and communicatio... more Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification. The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to ...

Research paper thumbnail of Principles of Computer Security: Security+ and Beyond

Research paper thumbnail of Limitations of end-to-end encryption in secure computer networks

Research paper thumbnail of Encryption protection in computer data communications

Proceedings of the 4th Data Communications …, Jan 1, 1975

Research paper thumbnail of A cryptographic key generation scheme for multilevel data security

Computers & Security, Jan 1, 1990

Research paper thumbnail of Encryption and secure computer networks

ACM Computing Surveys (CSUR), Jan 1, 1979

There is increasing growth in the number of computer networks in use and in the kinds of distribu... more There is increasing growth in the number of computer networks in use and in the kinds of distributed computing applications available on these networks This increase, together with concern about privacy, security, and integrity of information exchange, has created considerable interest in the use of encryptlon to protect information in the networks This survey is directed at the reader who ts knowledgeable about varmus network designs and who now wishes to consider incorporating encryption methods into these designs. It is also directed at developers of encryption algorithms who wish to understand the characteristics of such algorithms useful in network applications.

Research paper thumbnail of TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks

Proceedings of the 7th international conference on …, Jan 1, 2008

Public Key Cryptography (PKC) has been the enabling technology underlying many security services ... more Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols in traditional networks such as the Internet. In the context of wireless sensor networks, elliptic curve cryptography (ECC), one of the most efficient types of PKC, is being investigated to provide PKC support in sensor network applications so that the existing PKC-based solutions can be exploited.

Research paper thumbnail of Network security via private-key certificates

ACM SIGOPS Operating Systems Review, Jan 1, 1990

We present some practical security protocols that use private-key encryption in the public-key st... more We present some practical security protocols that use private-key encryption in the public-key style. Our system combines a new notion of private-key certificates, a simple key-translation protocol, and key-distribution. These certificates can be administered and used much as ...

Research paper thumbnail of A fundamental framework for network security* 1

Journal of Network and Computer Applications, Jan 1, 1997

The general concept of security in message communications may be traced to the advent of human ci... more The general concept of security in message communications may be traced to the advent of human civilization. In contrast, however, security in automation and control is a recent phenomenon, originating with the computer age and is rapidly gaining importance with the proliferation ...

Research paper thumbnail of Understanding PKI: concepts, standards, and deployment considerations

... Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. Top Sellers in thi... more ... Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. Top Sellers in this Category. ... Inside Cyber Warfare, 1st Edition by Jeffrey Carr. Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. ...

Research paper thumbnail of Security mechanisms for computer networks current results of the CEC COST-11 ter project

Computer networks and ISDN systems, Jan 1, 1988

... in a Network Environment (process distribution, synchronization of processes, distributed acc... more ... in a Network Environment (process distribution, synchronization of processes, distributed access control mechanisms) 111 ... 2. Verification Methods for Security Mechanisms 70 S. Muftic / Security Mechanisms for ... ric algorithms have also been described: B-Crypt module and FEAL ...

Research paper thumbnail of What is computer security?

Security & Privacy, IEEE, Jan 1, 2003

Research paper thumbnail of Cryptography and network security: principles and practice

Research paper thumbnail of Network security essentials: applications and standards

NETWORK SECURITY ESSENTIALS Applications and Standards Third Edition WILLIAM STALLINGS * •* •• &q... more NETWORK SECURITY ESSENTIALS Applications and Standards Third Edition WILLIAM STALLINGS * •* •• "^ J' • ... NETWORK SECURITY ESSENTIALS: APPLICATIONS AND STANDARDS THIRD EDITION ... THE WILLIAM STALLINGS BOOKS ON COMPUTER DATA AND COMPUTER ...

Research paper thumbnail of Cryptography and data security

Data security is the science and study of methods of protecting data in computer and communicatio... more Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification. The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to ...

Research paper thumbnail of Principles of Computer Security: Security+ and Beyond

Research paper thumbnail of Limitations of end-to-end encryption in secure computer networks

Research paper thumbnail of Encryption protection in computer data communications

Proceedings of the 4th Data Communications …, Jan 1, 1975

Research paper thumbnail of A cryptographic key generation scheme for multilevel data security

Computers & Security, Jan 1, 1990

Research paper thumbnail of Encryption and secure computer networks

ACM Computing Surveys (CSUR), Jan 1, 1979

There is increasing growth in the number of computer networks in use and in the kinds of distribu... more There is increasing growth in the number of computer networks in use and in the kinds of distributed computing applications available on these networks This increase, together with concern about privacy, security, and integrity of information exchange, has created considerable interest in the use of encryptlon to protect information in the networks This survey is directed at the reader who ts knowledgeable about varmus network designs and who now wishes to consider incorporating encryption methods into these designs. It is also directed at developers of encryption algorithms who wish to understand the characteristics of such algorithms useful in network applications.

Research paper thumbnail of TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks

Proceedings of the 7th international conference on …, Jan 1, 2008

Public Key Cryptography (PKC) has been the enabling technology underlying many security services ... more Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols in traditional networks such as the Internet. In the context of wireless sensor networks, elliptic curve cryptography (ECC), one of the most efficient types of PKC, is being investigated to provide PKC support in sensor network applications so that the existing PKC-based solutions can be exploited.

Research paper thumbnail of Network security via private-key certificates

ACM SIGOPS Operating Systems Review, Jan 1, 1990

We present some practical security protocols that use private-key encryption in the public-key st... more We present some practical security protocols that use private-key encryption in the public-key style. Our system combines a new notion of private-key certificates, a simple key-translation protocol, and key-distribution. These certificates can be administered and used much as ...

Research paper thumbnail of A fundamental framework for network security* 1

Journal of Network and Computer Applications, Jan 1, 1997

The general concept of security in message communications may be traced to the advent of human ci... more The general concept of security in message communications may be traced to the advent of human civilization. In contrast, however, security in automation and control is a recent phenomenon, originating with the computer age and is rapidly gaining importance with the proliferation ...

Research paper thumbnail of Understanding PKI: concepts, standards, and deployment considerations

... Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. Top Sellers in thi... more ... Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. Top Sellers in this Category. ... Inside Cyber Warfare, 1st Edition by Jeffrey Carr. Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. ...

Research paper thumbnail of Security mechanisms for computer networks current results of the CEC COST-11 ter project

Computer networks and ISDN systems, Jan 1, 1988

... in a Network Environment (process distribution, synchronization of processes, distributed acc... more ... in a Network Environment (process distribution, synchronization of processes, distributed access control mechanisms) 111 ... 2. Verification Methods for Security Mechanisms 70 S. Muftic / Security Mechanisms for ... ric algorithms have also been described: B-Crypt module and FEAL ...

Research paper thumbnail of What is computer security?

Security & Privacy, IEEE, Jan 1, 2003

Research paper thumbnail of Cryptography and network security: principles and practice

Research paper thumbnail of Network security essentials: applications and standards

NETWORK SECURITY ESSENTIALS Applications and Standards Third Edition WILLIAM STALLINGS * •* •• &q... more NETWORK SECURITY ESSENTIALS Applications and Standards Third Edition WILLIAM STALLINGS * •* •• "^ J' • ... NETWORK SECURITY ESSENTIALS: APPLICATIONS AND STANDARDS THIRD EDITION ... THE WILLIAM STALLINGS BOOKS ON COMPUTER DATA AND COMPUTER ...