Have a personal or library account? Click to login
Testing the Data Protection Through Implementation of Secure Communication Cover

Testing the Data Protection Through Implementation of Secure Communication

Open Access
|Oct 2022

References

  1. [1] W. Stallings: Network Security Essentials: Applications and Standards, 4th Edition, Prentice Hall Press, Upper Saddle River, NJ, USA, pp. 170-188, 2010
  2. [2] Z. Golebiewski, M. Kutylowski, F. Zagorski: Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks. In: Pointcheval D., Mu Y., Chen K. (Eds) Cryptology and Network Security, CANS, 200610.1007/11935070_13
  3. [3] Lecture Notes in Computer Science, vol 4301 Springer, Berlin, Heidelberg. https://doi.org/10.1007/11935070_1310.1007/11935070_13
  4. [4] M. Stahnke: Pro OpenSSH, Apress, pp. 147-164, 2006
  5. [5] N. Smyth: Android Studio Development Essentials, eB-ookFrenzy, pp. 107, 201, 2015
  6. [6] R. Cameron, N. R. Wyler: Juniper(r) Networks Secure Access SSL VPN Configuration Guide, April 2011, Syngress, ISBN: 9780080556635
  7. [7] D. J. Barrett, R. Silverman: SSH, The Secure Shell: The Definitive Guide, O’Reilly, 2nd Edition, pp. 39-49, 2005
  8. [8] T. Ylonen: The Secure Shell (SSH) Transport Layer Protocol, Informational RFC 4253, IETF, Network Working Group, 200610.17487/rfc4253
  9. [9] D. W. Dieterle: Basic Security Testing with Kali Linux, eBook, ISBN-13: 978-1494861278, pp. 185-190, 2013
  10. [10] T. Anjali, S. Krishna, Z. Poonam: Comparison between SSL and SSH in Network and Transport Layer, International Journal of Computer Science and Information Technologies, Vol. 6 (6), pp. 5432-5434, 2015
  11. [11] A. Garimella, D. R. Kumar: Secure Shell – Its Significance in Networking (SSH), International Journal of Application or Innovation in Engineering & Management, Volume 4, Issue 3, pp. 187-196, March 2015
  12. [12] R. W. Beggs: Mastering Kali Linux for Advanced Penetration Testing, Packt Publishing Ltd., pp. 258-278, 2014
  13. [13] T. Ylonen, C. Lonvick: The Secure Shell (SSH) Protocol Architecture, RFC 4251, January 200610.17487/rfc4251
  14. [14] Secure Shell Configuration Guide, Cisco IOS Release 15S, Americas Headquarters Cisco Systems, Inc., USA, 2015
  15. [15] M. Souppaya, K. Scarfone, L. Feldman: Securing Interactive and Automated Access Management Using Secure Shell (SSH), National Institute of Standards and Technology U.S. Department of Commerce, January 2016
DOI: https://doi.org/10.2478/bhee-2021-0014 | Journal eISSN: 2566-3151 | Journal ISSN: 2566-3143
Language: English
Page range: 21 - 30
Submitted on: Feb 1, 2021
Accepted on: Apr 1, 2021
Published on: Oct 26, 2022
Published by: Bosnia and Herzegovina National Committee CIGRÉ
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2022 Suad Kasapović, Emir Skejić, Tarik Huremović, published by Bosnia and Herzegovina National Committee CIGRÉ
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.