Search Results
102. There Be Dragons
103. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
104. The Security Flag in the IPv4 Header
105. The "Session Tty" Manager
106. The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
107. Trade-offs in Private Search
108. Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host
109. Two-Person Control Administration: Preventing Administration Faults through Duplication
110. Unconventional Wisdom
111. Usable Secure Private Search
112. Using Bloom Filters for Authenticated Yes/No Answers in the DNS
113. Using Link Cuts to Attack Internet Routing
114. Using the Domain Name System for System Break-ins
115. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence
116. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
117. Wiretapping the Net
118. Worm propagation strategies in an IPv6 Internet
- « Previous
- Next »
- 1
- 2
- 3