Security, Cryptography, and Magic

2/12/99


Click here to start


Table of Contents

Security, Cryptography, and Magic

Weak Points of the Internet

Security Flaws

Going Around the Cryptography

Certificates

Cryptography and Identity

Conclusions

Author: Steven M. Bellovin

Email: smb@research.att.com

Home Page: http://www.research.att.com/~smb

Download presentation source