Skip to main content
Security of e-Systems and Computer Networks
  • Get access
    Check if you have access via personal or institutional login
  • Cited by 21
  • Cited by
    This book has been cited by the following publications. This list is generated based on data provided by CrossRef.

    Farash, Mohammad Sabzinejad Islam, SK Hafizul and Obaidat, Mohammad S. 2015. A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks. Concurrency and Computation: Practice and Experience, Vol. 27, Issue. 17, p. 4897.

    Meshram, Chandrashekhar and Obaidat, Mohammad S. 2015. 2015 International Conference on Computer, Information and Telecommunication Systems (CITS). p. 1.

    Samoui, S. El Bouabidi, I. Obaidat, M. S. Zarai, F. Hsiao, K. F. and Kamoun, L. 2015. Improved IPSec tunnel establishment for 3GPP-WLAN interworking. International Journal of Communication Systems, Vol. 28, Issue. 6, p. 1180.

    Smaoui, Salima Obaidat, Mohammad S. Zarai, Faouzi and Hsiao, K. F. 2015. A new secure and efficient scheme for network mobility management. Security and Communication Networks, Vol. 8, Issue. 7, p. 1360.

    Koniaris, Ioannis Papadimitriou, Georgios Nicopolitidis, Petros and Obaidat, Mohammad 2014. 2014 IEEE International Conference on Communications (ICC). p. 1819.

    Padmadas, M. Krishnan, N. and Sasidharan, Sithara 2013. 2013 IEEE International Conference on Computational Intelligence and Computing Research. p. 1.

    Sayed, B. Traore, I. Woungang, I. and Obaidat, M. S. 2013. Biometric Authentication Using Mouse Gesture Dynamics. IEEE Systems Journal, Vol. 7, Issue. 2, p. 262.

    Papadimitriou, G. I. Obaidat, M. S. Papazoglou, C. and Pomportsis, A. S. 2012. Handbook of Computer Networks.

    Woungang, Isaac Dhurandher, Sanjay Kumar Obaidat, Mohammed S. Chao, Han-Chieh and Liu, Chris 2012. 2012 IEEE International Conference on Communications (ICC). p. 988.

    Cascado, Daniel Sevillano, Jose Luis Fern′andez-Luque, Luis Johan-Grøttum, Karl Vognild, L. Kristian and Burkow, T. M. 2011. Pervasive Computing and Networking.

    Che-Yu Liu, Woungang, I. Han-Chieh Chao, Dhurandher, S. K. Ting-Yun Chi, and Obaidat, M. S. 2011. 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011. p. 1.

    Dhurandher, Sanjay K. Obaidat, Mohammad S. Verma, Karan Gupta, Pushkar and Dhurandher, Pravina 2011. FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems. IEEE Systems Journal, Vol. 5, Issue. 2, p. 176.

    Jing-Wei Huang, Woungang, I. Han-Chieh Chao, Obaidat, M. S. Ting-Yun Chi, and Dhurandher, S. K. 2011. 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011. p. 1.

    O'Ree, Alexander J. and Obaidat, Mohammed S. 2011. Security enhancements for UDDI. Security and Communication Networks, Vol. 4, Issue. 8, p. 871.

    Obaidat, M.S. Papadimitriou, G. I. and Obeidat, S. 2011. Handbook of Computer Networks.

    Obaidat, Mohammad S. and Guelzim, Tarik 2011. Cooperative Networking.

    Rekhis, Slim Boudriga, Noureddine and Obaidat, Mohammad S. 2011. Handbook of Computer Networks.

    Dhurandher, Sanjay K. Obaidat, Mohammad S. Jaiswal, Amrit Tiwari, Akanksha and Tyagi, Ankur 2010. 2010 IEEE Globecom Workshops. p. 1550.

    Lu, Huiqi Gheitanchi, Shahin Young, Rupert and Chatwin, Chris 2010. 2010 Wireless Advanced 2010. p. 1.

    Obaidat, Mohammad S and Guelzim, Tarik 2010. A Counter Disassociation Mechanism (CDM) for Wireless LANs and its Performance Simulation Analysis. IEEE Systems Journal, Vol. 4, Issue. 1, p. 57.

  • Export citation
  • Recommend to librarian
  • Recommend this book

    Email your librarian or administrator to recommend adding this book to your organisation's collection.

    Security of e-Systems and Computer Networks
    • Online ISBN: 9780511536700
    • Book DOI:
    Please enter your name
    Please enter a valid email address
    Who would you like to send this to? *
  • Buy the print book

Book description

E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.

    • Aa
    • Aa
Refine List
Actions for selected content:
Select all | Deselect all
  • View selected items
  • Export citations
  • Download PDF (zip)
  • Send to Kindle
  • Send to Dropbox
  • Send to Google Drive
  • Send content to

    To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to .

    To send content to your Kindle, first ensure is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle.

    Note you can select to send to either the or variations. ‘’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

    Find out more about the Kindle Personal Document Service.

    Please be advised that item(s) you selected are not available.
    You are about to send:

Save Search

You can save your searches here and later view and run them again in "My saved searches".

Please provide a title, maximum of 40 characters.

This list contains references from the content that can be linked to their source. For a full set of references and notes please see the PDF or HTML where available.

M. S. Obaidat and D. Macchairllo . (1994). A multilayer neural network system for computer access security, IEEE Transactions on Systems, Man, and Cybernetics, Vol. 24, No. 5, 806–13.

M. Swanson (1998). Developing Security Plans for Information Technology Systems, NIST Special Publication 800–18.

D. Denning (1996). A taxonomy for key escrow encryption systems, Communications of the ACM, 39(3), 34–40.

W. Diffie and M. Q. Hellman (1976). New Directions In Cryptography. IEEE Transactions on Information Theory, Vol. 22(6), 644–54.

R. Rivest , A. Shamir , and L. Adleman . (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–6.

M. Anshel and D. Goldfeld (1997). Zeta functions, one-way functions, and pseudorandom generators. Duke Math Journal, 88, 371–90.

T. ElGamel (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT 31, 4, 469–72.

A. Menezes , P. Oorschot , and S. Vanstone (1996). The Handbook of Applied Cryptography. CRC Press.

S. Bleha and M. S. Obaidat (1991). Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Transactions Systems, Man, and Cybernetics, Vol. 21, No. 2.

S. Card , T. Moran , and A. Newell (1980). The keystroke level model for user performance time with interactive systems. Communications of ACM, Vol. 23, 396–410.

W. E. Cooper (1983). Cognitive Aspects of Skilled Typewriting. Springer-Verlag.

J. G. Daugman (1993). High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Recognition Machine Intelligence, Vol. 15, No. 11, 1148–61.

A. Jain , L. Hong , S. Pankanti , and R. Bolle (1997). An identity-authentication system using fingerprints, Proc. of IEEE, Vol. 85, No. 9, 1366.

Jain, A., R. Bolle, and S. Pankanti (1999). Introduction to biometrics. In Biometrics: Personal Identification in Networked Society, A. Jain , R. Bolle , and S. Pankanti (eds.), Kluwer, pp. 1–43.

R. Joyce and G. Gupta (1990). Identity authentication based on keystroke latencies. Communications of ACM, Vol. 33, No. 2, 168–76.

M. S. Obaidat (1993a). A methodology for improving computer access security. Computers & Security, Vol. 12, 657–62.

M. S. Obaidat and D. T. Macchairolo (1993b). An on-line neural network system for computer access security. IEEE Transactions Industrial Electronics, Vol. 40, No. 2, 235–41.

M. S. Obaidat , A. Brodzik and B. Sadoun (1998). A performance evaluation study of four Wavelet algorithms for pitch period estimation of speech signals. Information Sciences Journal, Vol. 112, No. (1–4), 213–21.

M. S. Obaidat , C. Lee , B. Sadoun and D. Nelson (1999). Estimation of pitch period of speech signals using a new dyadic Wavelet algorithm. Information Sciences Journal, Vol. 119, No. 1, 21–39.

D. Umphress and G. Williams (1985). Identity verification through keyboard characteristics. International Journal Man-Machine Studies, Vol. 23, 263–73.

M. Bellare , J. Garay , R. Hauser , A. Herzberg , H. Krawczyk , M. Steiner , G. Tsudik , E. Herreweghen Van , and M. Waidner (2000). Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communication. Vol. 18(4), 1–20.

B. N. Chun and A. C. Bavier (2004). Decentralized trust management and accountability in federated systems, HICSS2004, Jan. 5–8, 2004, Hawaii.

C. Ellison , B. Franz , B. Lampson , R. L. Rivest , B. M. Thomas , and T. Ylonen (1999b). SPKI requirements, IETF, RFC 2693.

T. Grandison and M. Sloman (2000). A survey of trust in Internet applications. IEEE Communications Surveys and Tutorials, Vol. 3, No. 4, 2–16.

S. Guemara-ElFatmi , N. Boudriga , and M. S. Obaidat (2004). Relational-based calculus for trust management in networked services, Computer Communication Journal, 27 (12), 1206–19.

A. Tsalgatidou and T. Pilioura (2002). An overview of standards and related technology in Web services. Distributed and Parallel Databases, 12, 135–62.

Boudriga, N. and S. Benabdallah (2002). Laying out the foundation for a digital government model, case study: Tunisia. In Advances in Digital Government: Technology, Human Factors, and Policy. W. J. McIver Jr. and A. K. Elmagarmid (eds.), Kluwer.

D. Chaum (2004b). Secret-ballot receipts: true voter-verifiable elections. IEEE Security and Privacy, 2(1): 38–47 (

M. Wimmer and B. Bredow (2002). A holistic approach for providing security solutions in e-government, Proceedings of the 35th Hawaii International Conference on System Sciences, 2002.

U. Varshney and R. Vetter (2001). A framework for the emerging mobile commerce applications. In Proceedings of the 34th Hawaii International Conference on System Sciences, 2001, IEEE Computer Society.

S. Bleha and M. S. Obaidat (1993). Computer user verification using the perceptron. IEEE Transactions on Systems, Man and Cybernetics, Vol. 23, No. 3, 900–2.

A. Harding (2003). SSL virtual private networks. Computers & Security, Vol. 22, No. 5, 416–420.

M. S. Obaidat (1997). An evaluation simulation study of neural network paradigm for computer users identification. Information Sciences Journal-Applications, Vol. 102, No. 1–4, 239–58.

M. S. Obaidat and B. Sadoun (1997). Verification of computer users using keystroke dynamics. IEEE Transactions on Systems, Man and Cybernetics, Part B, Vol. 27, No. 2, 261–9.

G. Rosenbaum , W. Lau , and S. Jha (2003). Recent directions in virtual private network solutions. IEEE International Conference on Networks (ICON 2003), September 2003.

J. Undercoffer , A. Joshi , and J. Pinkston (2003). Modeling computer attacks: an ontotlogy for intrusion detection. 6th International Symposium on Recent Advances in Intrusion Detection.

T. Braun , M. Guenter , and I. Khalil (2001). Management of quality of service enabled VPNs. IEEE Communications Magazine, May 2001, 90–98.

R. Cohen (2003). On the establishment of an access VPN in broadband access networks. IEEE Communications Magazine, 156–63, February 2003.

C. Metz (2003). The latest in virtual private networks: part I. IEEE Internet Computing, 87–91, January/February 2003.

M. A. Wright (2000). Virtual private network security. Network Security, volume 2000, Number 7, 11–14.

R. Younglove (2000). Virtual private networks: secure access for e-business. IEEE Internet Computing, Volume 4, Number 4, 96.


Full text views

Total number of HTML views: 0
Total number of PDF views: 171 *
Loading metrics...

Book summary page views

Total views: 376 *
Loading metrics...

* Views captured on Cambridge Core between September 2016 - 24th July 2017. This data will be updated every 24 hours.