Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Explores the significance of naming and indirection in computer systems, emphasizing the use of names for flexibility, scalability, and fault tolerance.
Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.