Links to some security related sites
Following are some pointers to other sites on the Internet that are involved in Computer Security related research or activities. Note that some these links may be outdated. These links have been provided here for information purposes only. It does not indicate any endorsement of the linked site by the instructor, or by CSU or any of its departments or affiliates.
Security in Academia (Research and Courses)
- Catholic University of Louvain (UCL) Crypto Group
- Cambridge University, Cambridge University
- Carnegie Melon University
- Clemson University Introduction to Cryptography course by Shuhong Gao
- Dartmouth Security Tools
- Duke – Introduction to Cryptography course by Jingmin He
- George Mason University
- George Washington University – Telecommunications Security course by John Pescatore
- Georgia Tech – Network Security course by Ken Calvert
- Graz University of Technology: Institute for Applied Information Processing and Communications
- Indiana University: (Riordan’s RIPEM page).
- Laboratory for Computer Security and Security Informatics at Stockholm University
- Lawrence Livermore National Laboratory – Computer Security Technology Center
- Leuven EE Dept Crypto offerings
- London School of Economics – Computer Security Research Center
- UMBC Security Technology Research Group (STRG), UMBC Institute for Global Electronic Commerce (IGEC)
- MIT:
- MIT’s Athena FTP Server Kerberos, X, Usenix papers, etc.
- Hal Abelson’s course, “Ethics and Law on the Electronic Frontier”
- Ron Rivest’s Fall 95 MIT course, “Computer and Network Security”
- Naval Research Laboratory
- New York University
- Purdue COAST Project (Computer Operations, Audit and Security Tools)
- GRECC (Group de Recherche en Complexite et Cryptographie) at the Ecole Normale Superieure in Paris.
- Rutgers University Network Services page on World Wide Web Security
- SRI Computer Science Lab.
- Texas AMU security tools.
- UC Davis Security Lab.
- University of Montreal.
- University of New Mexico Cryptology in Computing
- University of Southern California (Information Sciences Institute; Global Operating Systems Technology (GOST) Group)
- University of Wisconsin, Milwaukee
- Worchester Polytechnic
Industries involved in Security Research
- AccessData
- AT&T:
- Algorithmic Research
- Atlantic Systems Group
- Baltimore Technologies
- Bellcore (General), Bellcore Security Products, and Betsi
- BlueMoney
- BroadVision
- CertCo
- CertiCom
- Codex
- Cohesive Systems
- Computer Systems Consulting (CSC): CSC Security Gopher
- Consensus Development
- COST (Computer Security Technologies)
- Cryptomathic
- Cybercash
- CygnaCom Solutions, Inc.
- Cygnus Support and their Security brochure.Cryptography Export Control Archives.
- Data Fellows Ltd.
- DataKey
- DEC SRC publications (Especially reports 125, 117, 83, 70, 67, 39.) Digital Secure Systems Index
- Digicash.
- En Garde Systems.
- EIT (Enterprise Integration Technology).
- Entrust Technologies
- Firewall Security Corp.
- First Virtual
- Fronter Technologies
- FSA Corporation
- Global Technology Associates
- Harris Computer Systems
- Hewlett-Packard
- IBM T.J.Watson Network Security Group
- IBM Zurich Security Research Group
- IBM SecureWay
- Internet Security Systems, Inc.
- Isolation Systems
- Keywitness Canada
- KonaSoft
- Lockeed Martin Advanced Technology Labs (Cypris processor).
- Los Altos Technologies.
- Mach 5 (and their crypto page)
- Management Analytics
- Mastercard’s Secure Electronic Payment Protocol
- Microsoft.
- Mondex
- Morning Star Technologies
- NEC security server
- NetChex
- Netscape
- Open Market.
- Odyssey Research Associates (Recluse Web Security System)
- PC Dyanamics
- NSC (Network Systems Corp.)
- Quadralay Corporation. Crypto page
- Racal (Data Group)
- Raptor Systems markets firewalls and has a nice security library.
- RedCreek
- RPK Inc
- Rocksoft
- RSA Data Security
- SAIC (Science Applications International Corp.)
- SecureWare
- Security Dynamics
- Seven Locks Software, Inc.”
- Software and Systems Engineering Ltd (SSE)
- Spry.
- Spyglass. API spec
- Steptoe and Johnson LLP (Many papers on crypto policy and law; Stewart Baker works here.)
- SUN Microsystems.
- Surety Technologies.
- Tansu (Telecom Australia)’s Computer and Network Security Reference Index.
- Terisa Systems.
- TimeStep Corp.
- Terzcat Communications (Mike Scher, strange@tezcat.com): Security pages top level
- Trusted Information Systems (TIS)
- Ultimate Privacy
- VeriFone
- VeriSign
- ViaCrypt
- Visa
- V-ONE
- Xcert
Government Sources
- CESG: Communications-Electronic Security Group (in U.K.)
- DARPA
- FBI
- NIH (National Institutes of Health) page on Unix Security
- NIST (National Institute of Standards and Technology)
- NRC (National Research Council; Computer Science and Telecommunications Board)
- NSA (National Security Agency)
Technical Societies and other Non-Profit Organizations
- ABA (American Bar Association; Electronic Commerce and Information Technology Division; Digital Signature Guidelines)
- ACM (Association for Computing Machinery)
- ANSI (American National Standards Institute)
- BSA (Business Software Alliance)
- CDT (Center for Democracy and Technology
- Commerce Net
- CPSR (Computer Professionals for Social Responsibility).
- EFF (Electronic Frontier Foundation).
- EPIC (Electronic Privacy Information Center).
- Encryption Policy Resource Page
- Global Internet Project
- IACR (International Association for Cryptologic Research).
- IEEE Computer Society on Security and Privacy
- IFIP Technical Committee on Security and Protection in Information Systems
- IEEE P1363 standards committee
- Internet Privacy Coalition
- Internet Society
- Key Recovery Alliance
- NCSA (National Computer Security Association)
- Privacy International (Material on ID cards)
- USENIX
- Voters Telecommunications Watch (VTW)
- Lawrie Brown’s (searchable) cryptography bibliography
- IACR Conference Proceedings, by Author Name
- Sean Irvine’s collection
- Journal of Cryptology bibliography and table of contents (from IACR).
- Kevin McCurley’s bibliography on computational number theory
- Itribe (Cryptography Technical Report Server)
- Quantum Computing Bibliography from University of Montreal.
- Ron Rivest’s Crypto and Security bibliography (Bibtex).
- CS bibliographies, including STOC and FOCS
- Doug Stinson’s bibliography on authentication codes
- Doug Stinson’s bibliography on secret sharing schemes
News Groups, NewsLetters, and FAQ’s
- Anonymous remailer FAQ
- Cipher, the newsletter of the Technical Committee on Security and Privacy of the Computer Society of the IEEE. Their calendar of upcoming events.
- sci.crypt(FAQ)
- sci.crypt.research
- Hell’s Kitchen Software (Coderpunks archives)
- talk.politics.crypto
- comp.security.misc(FAQ)(FAQ)(FAQ)
- alt.security(FAQ) (FAQ)
- comp.security.announce
- sura.security
- WWW-buyinfo
- alt.security.pgp(FAQ)
- alt.security.keydist
- alt.security.ripem(FAQ)
- comp.security.unix(FAQ)(FAQ)
- comp.protocols.kerberos
- comp.virus(FAQ)
- comp.risks
- FAQ for alt.security.misc
- FAQ for Firewalls
- FAQ for Privacy Enhanced Mail (PEM)
- Cryptography FAQ
Alert Sites
- NASIRC – NASA Automated Systems Incident Response Capability
- CERT (Computer Emergency Response Center at CMU) and ASSIST – Automated Systems Security Incident Support Team
- DDN – DEFENSE DATA NETWORK
- German DFN-CERT
- CIAC (Computer Incident Advisory Capability (DOE/LLNL)
- FIRST – Forum of Incident Response and Security Teams
- AUSERT – Australian Security Emergency Response Team