Search Results
2. The "Session Tty" Manager
3. Pseudo-Network Drivers and Virtual Networks
4. Limitations of the Kerberos Authentication System
5. A Best-Case Network Performance Model
6. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks
7. There Be Dragons
8. An Attack on the Interlock Protocol When Used for Authentication
9. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise
10. Packets Found on an Internet
11. A Programmable Plaintext Recognizer
12. Firewall-Friendly FTP
13. On Many Addresses per Host
14. Security Concerns for IPng
15. Session-Layer Encryption
16. Using the Domain Name System for System Break-ins
17. A Better Key Schedule for DES-like Ciphers
18. A "Bump in the Stack" Encryptor for MS-DOS Systems
19. A DNS Filter and Switch for Packet-filtering Gateways
20. Defending Against Sequence Number Attacks
21. Problem Areas for the IP Security Protocols
22. Probable Plaintext Cryptanalysis of the IP Security Protocols
23. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
24. Critical Infrastructures You Can Trust: Where Telecommunications Fits
25. Cryptography and the Internet
26. Report of the IAB Security Architecture Workshop
27. Distributed Firewalls
28. Moat: A Virtual Private Network Appliance and Services Platform
29. TCP Compression Filter
30. TCP Filters
31. AES Key Agility Issues in High-Speed IPsec Implementations
32. Client Certificate and Key Retrieval for IKE
33. Implementing a Distributed Firewall
34. Results of the Security in ActiveX Workshop, Pittsburgh, Pennsylvania USA, August 22-23, 2000
35. Wiretapping the Net
36. A "Reason" Field for ICMP "Administratively Prohibited" Messages
37. Building a Secure Web Browser
38. Computer Security—An End State?
39. Cryptographic Modes of Operation for the Internet
40. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols
41. Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host
42. Using Bloom Filters for Authenticated Yes/No Answers in the DNS
43. A Technique for Counting NATted Hosts
44. Controlling High Bandwidth Aggregates in the Network
45. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
46. Implementing Pushback: Router-Based Defense Against DDoS Attacks
47. Security Through Obscurity Considered Dangerous
48. Sub-Operating Systems: A New Approach to Application Security
49. Access Control Prefix Router Advertisement Option for IPv6
50. Cybersecurity Research Needs
- « Previous
- Next »
- 1
- 2
- 3