Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC)

  • Charles A. Shoniregun
Part of the Advances in Information Security book series (ADIS, volume 34)


Virtual Private Network Internet Engineer Task Force Label Switch Path Security Association Internet Security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Allen, J., Alberts, C., Behrens, S., Laswell, B., and Wilson, W., 2000, Improving the Security of Networked Systems, Cross Talk, The Journal of Defence Software EngineeringGoogle Scholar
  2. Cisco, 2002, IPSec Network Security, Cisco Systems, Inc USA, (January 12, 2007)Google Scholar
  3. Comer, D E., 2000, Internetworking with TCP/IP, 4th Edition, Prentice Hall, USA.Google Scholar
  4. Cross S E, 2000, Cyber Security, 2000, Software Engineering Institute, Carnegie Mellon University, USA.Google Scholar
  5. Dekker, M., 1997, Security of the Internet, Froehlich and Kent Encyclopaedia of Telecommunications, Vol 15.Google Scholar
  6. Doraswamy, N. and Harkins, D., 2003, IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks, 2nd Edition, Prentice Hall USA.Google Scholar
  7. Ettlie J. E., 2000, Managing Technology Innovation, John Wiley and Sons.Google Scholar
  8. Friedl, S.J., 2005, An Illustrated Guide to IPSec, - Software Consulting Central, (January 18, 2007)Google Scholar
  9. Harrison, J. 2003, VPN Technologies —A COMPARISON, http://vnu.bitpi (December 27, 2006)Google Scholar
  10. Householder, A., Manion, A., Pesante, L., and Weaver, G.M., 2001, Managing the Threat of Denial-of-Service Attacks, Research paper v10.0 presented at CERT Annual Conference, Carnegie Mellon University, USAGoogle Scholar
  11. Kent, S. and Seo, K., 2005, Security Architecture for Internet Protocol, [see RFC 4301 documentation for further details].Google Scholar
  12. Larochelle, D., 2001, Statically Detecting Likely Buffer Overflow Vulnerabilities, in the Proceedings of the 10th USENIX Security Symposium.Google Scholar
  13. Microsoft NetTech, 2002, Internet Protocol Security, (January 11, 2006)Google Scholar
  14. Pepelnjak, I., and Guichard, J., 2001, MPLS and VPN Architectures, Vol 1, Cisco Press.Google Scholar
  15. Russell, D. and Gangemi Sr, G.T., 1992, Computer Security Basics, Published by O’Reilly & Associates, Inc.Google Scholar
  16. Shannon C. E., and Weaver W., 1949, The mathematical theory of communication, University of Illinois Press, USA.MATHGoogle Scholar
  17. Shirey, R 2000, Internet Security Glossary, [see RFC 2828 documentation for further details].Google Scholar
  18. Shoniregun C.A., Nwankwo S., Imafidon C., and Wynarczyk, P., 2005a, ‘Information security challenges facing TEISME business operations in the UK’, International Journal for Infonomics (IJI), vol. 1.Google Scholar
  19. Shoniregun, C. A., 2005b, Impacts and Risk Assessment of Technology for Internet Security: Enable information Small-medium Enterprises (TEISMEs), Springer New York, USA.Google Scholar
  20. Shoniregun, C.A., 2006a, Distinguished Lecture: Synchronising IPSec with Biomterics, Purdue University Calumet, Indiana, USA.Google Scholar
  21. Shoniregun, C.A., 2006b, Distinguished Lecture: Phisihing for Information, Manchester Metropolitan University, Manchester, UK.Google Scholar
  22. Shoniregun, C.A., Chochliouros, I.P., Laperche, B., Logvynovskiy, O., and Spiliopoulou-Chochliourou, A., 2004, Questioning The Boundary Issues of Internet Security, e-Centre for Infonomics, London.Google Scholar
  23. Stalling, W., 2004, Network security essentials: applications and standards, Prentice Hall, USA.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Charles A. Shoniregun
    • 1
  1. 1.Reader in Computing, KNURE/KSAC Distinguished Professor, School of Computing & TechnologyUniversity of East LondonLondon E16 2RDUnited Kingdom

Personalised recommendations