Search Results
2. A Better Key Schedule for DES-like Ciphers
3. A "Bump in the Stack" Encryptor for MS-DOS Systems
4. A Clean-Slate Design for the Next-Generation Secure Internet
5. A DNS Filter and Switch for Packet-filtering Gateways
6. AES Key Agility Issues in High-Speed IPsec Implementations
7. A Look Back at "Security Problems in the TCP/IP Protocol Suite"
8. An Algebra for Integration and Analysis of Ponder2 Policies
9. An Anonymous Credit Card System
10. An Attack on the Interlock Protocol When Used for Authentication
11. APOD: Anonymous Physical Object Delivery
12. A Programmable Plaintext Recognizer
13. A Technique for Counting NATted Hosts
14. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise
15. Building a Secure Web Browser
16. Computer Security—An End State?
17. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent
18. Configuration Management and Security
19. Controlling High Bandwidth Aggregates in the Network
20. Critical Infrastructures You Can Trust: Where Telecommunications Fits
- « Previous
- Next »
- 1
- 2
- 3
- 4