Rutuja Patil | Shivaji University, Kolhapur, India (original) (raw)
Papers by Rutuja Patil
Data security is the science and study of methods of protecting data in computer and communicatio... more Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification. The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to ...
Proceedings of the 4th Data Communications …, Jan 1, 1975
Computers & Security, Jan 1, 1990
ACM Computing Surveys (CSUR), Jan 1, 1979
There is increasing growth in the number of computer networks in use and in the kinds of distribu... more There is increasing growth in the number of computer networks in use and in the kinds of distributed computing applications available on these networks This increase, together with concern about privacy, security, and integrity of information exchange, has created considerable interest in the use of encryptlon to protect information in the networks This survey is directed at the reader who ts knowledgeable about varmus network designs and who now wishes to consider incorporating encryption methods into these designs. It is also directed at developers of encryption algorithms who wish to understand the characteristics of such algorithms useful in network applications.
Proceedings of the 7th international conference on …, Jan 1, 2008
Public Key Cryptography (PKC) has been the enabling technology underlying many security services ... more Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols in traditional networks such as the Internet. In the context of wireless sensor networks, elliptic curve cryptography (ECC), one of the most efficient types of PKC, is being investigated to provide PKC support in sensor network applications so that the existing PKC-based solutions can be exploited.
ACM SIGOPS Operating Systems Review, Jan 1, 1990
We present some practical security protocols that use private-key encryption in the public-key st... more We present some practical security protocols that use private-key encryption in the public-key style. Our system combines a new notion of private-key certificates, a simple key-translation protocol, and key-distribution. These certificates can be administered and used much as ...
Journal of Network and Computer Applications, Jan 1, 1997
The general concept of security in message communications may be traced to the advent of human ci... more The general concept of security in message communications may be traced to the advent of human civilization. In contrast, however, security in automation and control is a recent phenomenon, originating with the computer age and is rapidly gaining importance with the proliferation ...
... Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. Top Sellers in thi... more ... Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. Top Sellers in this Category. ... Inside Cyber Warfare, 1st Edition by Jeffrey Carr. Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. ...
Computer networks and ISDN systems, Jan 1, 1988
... in a Network Environment (process distribution, synchronization of processes, distributed acc... more ... in a Network Environment (process distribution, synchronization of processes, distributed access control mechanisms) 111 ... 2. Verification Methods for Security Mechanisms 70 S. Muftic / Security Mechanisms for ... ric algorithms have also been described: B-Crypt module and FEAL ...
Security & Privacy, IEEE, Jan 1, 2003
NETWORK SECURITY ESSENTIALS Applications and Standards Third Edition WILLIAM STALLINGS * •* •• &q... more NETWORK SECURITY ESSENTIALS Applications and Standards Third Edition WILLIAM STALLINGS * •* •• "^ J' • ... NETWORK SECURITY ESSENTIALS: APPLICATIONS AND STANDARDS THIRD EDITION ... THE WILLIAM STALLINGS BOOKS ON COMPUTER DATA AND COMPUTER ...
Data security is the science and study of methods of protecting data in computer and communicatio... more Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification. The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to ...
Proceedings of the 4th Data Communications …, Jan 1, 1975
Computers & Security, Jan 1, 1990
ACM Computing Surveys (CSUR), Jan 1, 1979
There is increasing growth in the number of computer networks in use and in the kinds of distribu... more There is increasing growth in the number of computer networks in use and in the kinds of distributed computing applications available on these networks This increase, together with concern about privacy, security, and integrity of information exchange, has created considerable interest in the use of encryptlon to protect information in the networks This survey is directed at the reader who ts knowledgeable about varmus network designs and who now wishes to consider incorporating encryption methods into these designs. It is also directed at developers of encryption algorithms who wish to understand the characteristics of such algorithms useful in network applications.
Proceedings of the 7th international conference on …, Jan 1, 2008
Public Key Cryptography (PKC) has been the enabling technology underlying many security services ... more Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols in traditional networks such as the Internet. In the context of wireless sensor networks, elliptic curve cryptography (ECC), one of the most efficient types of PKC, is being investigated to provide PKC support in sensor network applications so that the existing PKC-based solutions can be exploited.
ACM SIGOPS Operating Systems Review, Jan 1, 1990
We present some practical security protocols that use private-key encryption in the public-key st... more We present some practical security protocols that use private-key encryption in the public-key style. Our system combines a new notion of private-key certificates, a simple key-translation protocol, and key-distribution. These certificates can be administered and used much as ...
Journal of Network and Computer Applications, Jan 1, 1997
The general concept of security in message communications may be traced to the advent of human ci... more The general concept of security in message communications may be traced to the advent of human civilization. In contrast, however, security in automation and control is a recent phenomenon, originating with the computer age and is rapidly gaining importance with the proliferation ...
... Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. Top Sellers in thi... more ... Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. Top Sellers in this Category. ... Inside Cyber Warfare, 1st Edition by Jeffrey Carr. Network Security with OpenSSL by John Viega; Matt Messier; Pravir Chandra. ...
Computer networks and ISDN systems, Jan 1, 1988
... in a Network Environment (process distribution, synchronization of processes, distributed acc... more ... in a Network Environment (process distribution, synchronization of processes, distributed access control mechanisms) 111 ... 2. Verification Methods for Security Mechanisms 70 S. Muftic / Security Mechanisms for ... ric algorithms have also been described: B-Crypt module and FEAL ...
Security & Privacy, IEEE, Jan 1, 2003
NETWORK SECURITY ESSENTIALS Applications and Standards Third Edition WILLIAM STALLINGS * •* •• &q... more NETWORK SECURITY ESSENTIALS Applications and Standards Third Edition WILLIAM STALLINGS * •* •• "^ J' • ... NETWORK SECURITY ESSENTIALS: APPLICATIONS AND STANDARDS THIRD EDITION ... THE WILLIAM STALLINGS BOOKS ON COMPUTER DATA AND COMPUTER ...