Computer networks -- 2008-2009 -- info.uvt.ro/Course 12
Appearance
Quick links: front; agenda; courses 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13; examination.
Please note that the current work serves mainly as general guidance and discussion topics, and is by no means the reference material for the course. For further information please consult the dedicated section. |
Please consult the following pages (from previous year):
References:
- Computer Networks, 4th edition -- chapter 8 Network Security:
- section 8.1 Cryptography, the introduction part;
- section 8.2 Symmetric-Key Algorithms, the introduction part, plus:
- section 8.2.3 Cipher Modes;
- section 8.3 Public-Key Algorithms;
- section 8.4 Digital Signatures;
- section 8.5 Management of Public Keys;
- conf. dr. Victoria Iordan, iordan@info.uvt.ro
- Ciprian Dorin Craciun, ccraciun@info.uvt.ro
- Marian Neagul, marian@info.uvt.ro