Synchronising Internet Protocol Security (SIPSEC) Model

  • Charles A. Shoniregun
Part of the Advances in Information Security book series (ADIS, volume 34)


Elliptic Curve Discrete Logarithm Problem Iris Recognition Transport Layer Security Internet Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Barrett, D. J., and Silverman, R.E., 2001, SSH: The Secure Shell, The Definitive Guide, O’Reilly & Associates.Google Scholar
  2. Benbasat, I., Goldstein, D. K., and Mead, M., 1987, The Case Research Strategy in Studies of Information Systems, MIS Quarterly, Sept, pp 369-386.Google Scholar
  3. Diffie, W. and Hellman, M.E., 1976, New Directions in Cryptography, IEEE Transactions on Information Theory, Vol IT-22, No. 6, November.Google Scholar
  4. Huston. B., 2002, A Higher view of Defense in Depth, www.itworld.comh/nl/securitystrat/02202002/ (February 20, 2002).Google Scholar
  5. Menezes, A.J., 19997, Elliptic Curve Public Key Cryptosystems, Fourth Printing, Kluwer Academic Publishers.Google Scholar
  6. Ross, A.A., (2003), Ph D Thesis: Information Fusion in Fingerprint Authentication, Michigan State University, /publications.html/genbio (9 February 2007).Google Scholar
  7. Schneier, B., 1998, Applied Cryptography, 2nd Edition, John Wiley & Sons Inc.Google Scholar
  8. Shoniregun, C.A. 2005, Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES), Springer-Verlag.Google Scholar
  9. Tian. Y., and Bolle, R, M., 2003, Automatic Detecting Neutral Face for Face Authentication and Facial Expression Analysis, issue24 March.Google Scholar
  10. Yin, R., (1994) ‘Case Study Research, Design and Method’, London: SageGoogle Scholar
  11. Ylonen, T., and Moffat, D., 2002, SSH Authentication Protocol, Network Working group, Internet Draft, September.Google Scholar
  12. Ylonen, T., and Moffat, D., 2003, SSH Protocol Architecture, Network Working group, Internet Draft, October.Google Scholar
  13. Zikmund, 1997, Business Research Methods, 5th Ed, Sydney: The Dryden Press.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Charles A. Shoniregun
    • 1
  1. 1.Reader in Computing, KNURE/KSAC Distinguished Professor, School of Computing & TechnologyUniversity of East LondonLondon E16 2RDUnited Kingdom

Personalised recommendations