Search Results
2. A Secure Active Network Environment Architecture: Realization in SwitchWare
3. KeyNote: Trust Management for Public-Key Infrastructures
4. Safety and Security of Programmable Network Infrastructures
5. The SwitchWare Active Network Architecture
6. A Secure Plan
7. Implementing a Distributed Firewall
8. Scalable Resource Control in Active Networks
9. Secure Quality of Service Handling: SQoSH
10. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols
11. Offline Micropayments without Trusted Hardware
12. The Price of Safety in an Active Network
13. A Secure PLAN (Extended Version)
14. A Study of the Relative Costs of Network Security Protocols
15. Designing an Embedded Firewall/VPN Gateway
16. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
17. Fileteller: Paying and Getting Paid for File Storage
18. Secure Overlay Services
19. Trust Management for IPsec
20. Using Overlays to Improve Network Security
21. xPF: Packet Filtering for Low-Cost Network Monitoring
22. Accelerating Application-Level Security Protocols
23. A Cooperative Immunization System for an Untrusting Internet
24. A Holistic Approach to Service Survivability
25. A Network Worm Vaccine Architecture
26. A Secure PLAN
27. Countering Code Injection Attacks With Instruction Set Randomization
28. Design and Implementation of Virtual Private Services
29. Drop-in Security for Distributed and Portable Computing Elements
30. EasyVPN: IPsec Remote Access Made Easy
31. Experience with the KeyNote Trust Management System: Applications and Future Directions
32. Managing Access Control in Large Scale Heterogeneous Networks
33. One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses
34. Secure and Flexible Global File Sharing
35. SOS: An Architecture for Mitigating DDoS Attacks
36. Tagging Data In The Network Stack: mbuf tags
37. TAPI: Transactions for Accessing Public Infrastructure
38. The Design of the OpenBSD Cryptographic Framework
39. The STRONGMAN Architecture
40. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers
41. WebDAVA: An Administrator-Free Approach To Web File-Sharing
42. WebSOS: Protecting Web Servers From DDoS Attacks
43. A Pay-per-Use DoS Protection Mechanism For the Web
44. CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
45. Dealing with System Monocultures
46. Hydan: Hiding Information in Program Binaries
47. Just Fast Keying: Key Agreement in a Hostile Internet
48. "Patch-on-Demand" Saves Even More Time?
49. Recursive Sandboxes: Extending Systrace To Empower Applications
50. SQLrand: Preventing SQL Injection Attacks
- « Previous
- Next »
- 1
- 2
- 3
- 4