咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献
  • 1 篇 学位论文
  • 1 篇 会议

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 哲学
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 工学
    • 1 篇 电气工程

主题

  • 3 篇 secure shell pro...
  • 1 篇 authenticated ke...
  • 1 篇 intrusion detect...
  • 1 篇 security framewo...
  • 1 篇 classifier
  • 1 篇 network time pro...
  • 1 篇 ciphersuites
  • 1 篇 symmetric & asym...
  • 1 篇 encryption algor...
  • 1 篇 ensemble
  • 1 篇 cross-validation
  • 1 篇 transport layer ...
  • 1 篇 time synchronisa...
  • 1 篇 negotiation
  • 1 篇 honeynet
  • 1 篇 provable securit...
  • 1 篇 ssh

机构

  • 1 篇 inst tecnol cast...
  • 1 篇 univ burgos dept...
  • 1 篇 queensland unive...
  • 1 篇 rajiv gandhi col...
  • 1 篇 dr pauls coll en...
  • 1 篇 univ salamanca d...
  • 1 篇 mondragon univ e...

作者

  • 1 篇 vanitha s.
  • 1 篇 sedano j.
  • 1 篇 herrero a.
  • 1 篇 arvind k. s.
  • 1 篇 gonzalez s.
  • 1 篇 geetha n.
  • 1 篇 iyappan p.
  • 1 篇 benjamin dowling
  • 1 篇 corchado e.
  • 1 篇 zurutuza urko

语言

  • 3 篇 英文
检索条件"主题词=Secure Shell Protocol"
3 条 记 录,以下是1-10 订阅
排序:
Pluggable Encryption Algorithm In secure shell(SSH) protocol
Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol
收藏 引用
2nd International Conference on Emerging Trends in Engineering and Technology (ICETET09)
作者: Iyappan, P. Arvind, K. S. Geetha, N. Vanitha, S. Rajiv Gandhi Coll Engg & Technol Pondicherry India Dr Pauls Coll Engn Pondicherry India
System security is a crucial constraint for secure Transfer of data. Because of the nature of the SSH protocol, anyone with access to the central server can manipulate files, it is imperative that only authorized user... 详细信息
来源: 评论
Different approaches for the detection of SSH anomalous connections
收藏 引用
LOGIC JOURNAL OF THE IGPL 2016年 第1期24卷 104-114页
作者: Gonzalez, S. Herrero, A. Sedano, J. Zurutuza, Urko Corchado, E. Inst Tecnol Castilla & Leon C Lopez Bravo 70 Burgos 09001 Spain Univ Burgos Dept Civil Engn Ave Cantabria S-N Burgos 09006 Spain Mondragon Univ Elect & Comp Dept Goiru Kalea 2 Arrasate Mondragon 20500 Spain Univ Salamanca Dept Informat & Automat Plaza de la Merced S-N E-37008 Salamanca Spain
The secure shell protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has bee... 详细信息
来源: 评论
Provable Security of Internet protocols
Provable Security of Internet Protocols
收藏 引用
作者: Benjamin Dowling Queensland University of Technology
学位级别:博士
The world has changed. Every day, users log on to social media, use online banking to hasten important transactions and utilize cloud services to host data online. This unprecedented level of access to personal and fi... 详细信息
来源: 评论