Table of Contents
Security, Cryptography, and Magic
Weak Points of the Internet
Security Flaws
Going Around the Cryptography
Certificates
Cryptography and Identity
Conclusions
|
Author: Steven M. Bellovin
Email: smb@research.att.com
Home Page: http://www.research.att.com/~smb
Download presentation source
|