Internal corporative security: Protocols preventing leakage of sensitive information and assuring authorized network traffic in the domain of Gaussian integers

Document Type

Conference Proceeding

Publication Date

12-1-2009

Abstract

Securing large corporate communication networks has become an increasingly difficult task. Sensitive information routinely leaves the company network boundaries and falls into the hands of unauthorized users. New techniques are required in order to classify packets based on user identity in addition to the traditional source and destination host addresses. This paper introduces Gaussian cryptographic techniques and protocols to assist network administrators in the complex task of identifying the originators of data packets on a network and more easily policing their behavior.

Identifier

84883387932 (Scopus)

ISBN

[9781615672417]

Publication Title

18th International Conference on Software Engineering and Data Engineering 2009 Sede 2009

First Page

244

Last Page

249

This document is currently not available here.

Share

COinS