Network Security



A better Internet?



Network Security



Basic Encryption



Security Algorithms, Protocols



Security Observations



TLS (SSL)



TLS Vulnerabilities



Anonymous Communications



Pseudonymous Communications



Other Attacks



The Onion Router



TOR details



TOR weaknesses



Other anonymity systems



Multi-Hop Latency



Throughput



Improving Throughput



Internet Performance



Overall Performance Issues



Network Architecture



Network Protocol Architectures: OSI



Network Protocol Architectures: TCP/IP



Network Protocol Architectures: ATM



Network Protocol Architectures



Data Encoding



Data Compression



Multimedia networking



Encryption and Authentication



Security



Security Algorithms, Protocols



Key management and Secret Key Systems



Public Key Systems



Potential Futures