Search Results
2. A Better Approach than Carrier-Grade-NAT
3. A Better Key Schedule for DES-like Ciphers
4. A "Bump in the Stack" Encryptor for MS-DOS Systems
5. Access Control Prefix Router Advertisement Option for IPv6
6. A Clean-Slate Design for the Next-Generation Secure Internet
7. A DNS Filter and Switch for Packet-filtering Gateways
8. AES Key Agility Issues in High-Speed IPsec Implementations
9. A Look Back at "Security Problems in the TCP/IP Protocol Suite"
10. An Algebra for Integration and Analysis of Ponder2 Policies
11. An Anonymous Credit Card System
12. An Anonymous Credit Card System
13. An Attack on the Interlock Protocol When Used for Authentication
14. APOD: Anonymous Physical Object Delivery
15. A Programmable Plaintext Recognizer
16. A Real World Identity Management System with Master Secret Revocation
17. A "Reason" Field for ICMP "Administratively Prohibited" Messages
18. A Secure and Privacy-Preserving Targeted Ad-System
19. A Technique for Counting NATted Hosts
20. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise
21. Building a Secure Web Browser
22. Client Certificate and Key Retrieval for IKE
23. Computer Security—An End State?
24. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent
25. Configuration Management and Security
26. Controlling High Bandwidth Aggregates in the Network
27. Critical Infrastructures You Can Trust: Where Telecommunications Fits
28. Cryptographic Modes of Operation for the Internet
29. Cryptography and the Internet
30. Cybersecurity Research Needs
31. Cybersecurity through an Identity Management System
32. Defending Against Sequence Number Attacks
33. Deploying a New Hash Algorithm
34. Design and Implementation of Virtual Private Services
35. Distributed Firewalls
36. DRM, Complexity, and Correctness
37. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
38. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols
39. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks
40. Firewall-Friendly FTP
41. Frank Miller: Inventor of the One-Time Pad
42. Further Information on Miller's 1882 One-Time Pad
43. Guidelines for Cryptographic Key Management
44. Guidelines for Specifying the Use of IPsec Version 2
45. High Performance Firewalls in MANETs
46. ICMP Traceback Messages
47. Identity and Security
48. Implementing a Distributed Firewall
49. Implementing Pushback: Router-Based Defense Against DDoS Attacks
50. Just Fast Keying: Key Agreement in a Hostile Internet
- « Previous
- Next »
- 1
- 2
- 3