-
1
-
-
85077206746
-
The BSD Packet Filter: A New Architecture for User-level Packet Capture
-
San Diego (January)
-
Steven McCanne and Van Jacobson, "The BSD Packet Filter: A New Architecture for User-level Packet Capture," pp. 259-269 in Proc. of Winter USENIX Conf., San Diego (January, 1993).
-
(1993)
Proc. of Winter USENIX Conf
, pp. 259-269
-
-
McCanne, Steven1
Jacobson, Van2
-
2
-
-
0004586467
-
A Pageable Memory Based Filesystem
-
Anaheim (June)
-
Marshall Kirk McKusick, Michael J. Karels, and Keith Bostic, "A Pageable Memory Based Filesystem," pp. 137-143 in Proc. Summer USENIX Conf., Anaheim (June, 1990).
-
(1990)
Proc. Summer USENIX Conf
, pp. 137-143
-
-
McKusick, Marshall Kirk1
Karels, Michael J.2
Bostic, Keith3
-
3
-
-
0004610703
-
Secure Deletion of Data from Magnetic and Solid-State Memory
-
San Jose (July)
-
Peter Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," pp. 77-89 in Proc. of Sixth USENIX Security Symp., San Jose (July, 1996).
-
(1996)
Proc. of Sixth USENIX Security Symp
, pp. 77-89
-
-
Gutmann, Peter1
-
5
-
-
84955573096
-
How to Protect DES Against Exhaustive Key Search
-
ed. N. Koblitz, Springer-Verlag
-
Joe Kilian and Phillip Rogaway, "How to Protect DES Against Exhaustive Key Search," pp. 252-267 in Advances in Cryptology - Crypto '96, Lecture Notes in Computer Science, ed. N. Koblitz, Springer-Verlag (1996).
-
(1996)
Advances in Cryptology - Crypto '96, Lecture Notes in Computer Science
, pp. 252-267
-
-
Kilian, Joe1
Rogaway, Phillip2
-
6
-
-
85095965787
-
-
(December)
-
Phil Karn, karn@unix.ka9q.ampr.org (December, 1995).
-
(1995)
-
-
Karn, Phil1
-
8
-
-
85084160278
-
Software Generation of Cryptographically Strong Random Numbers
-
San Antonio (January)
-
Peter Gutmann, "Software Generation of Cryptographically Strong Random Numbers," pp. 243-257 in Proc. of Seventh USENIX Security Symp., San Antonio (January, 1998).
-
(1998)
Proc. of Seventh USENIX Security Symp
, pp. 243-257
-
-
Gutmann, Peter1
-
9
-
-
85084161255
-
Cryptographic Support for Secure Logs on Untrusted Machines
-
San Antonio (January)
-
B. Schneier and J. Kelsey, "Cryptographic Support for Secure Logs on Untrusted Machines," pp. 53-62 in Proc. of Seventh USENIX Security Symp., San Antonio (January, 1998).
-
(1998)
Proc. of Seventh USENIX Security Symp
, pp. 53-62
-
-
Schneier, B.1
Kelsey, J.2
-
10
-
-
0004632577
-
-
Unpublished, Ann Arbor (July)
-
Joseph M. Saul, Peter Honeyman, and Virginia Rezmierski, "Policy Issues Related to Network Monitoring: The Secure Packet Vault," Unpublished, Ann Arbor (July, 1997).
-
(1997)
Policy Issues Related to Network Monitoring: The Secure Packet Vault
-
-
Saul, Joseph M.1
Honeyman, Peter2
Rezmierski, Virginia3
-
11
-
-
85095967039
-
-
Electronic Frontier Foundation, in
-
Electronic Frontier Foundation, in www.eff.org/DesCracker/.
-
-
-
-
12
-
-
0003402107
-
-
(January)
-
Matt Blaze, Whitfield Diffie, Ronald L. Rivest, Bruce Schneier, Tsutomu Shimomura, Eric Thompson, and Michael Wiener, "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security", in www.counterpane. com/keylength.html (January, 1996).
-
(1996)
Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security
-
-
Blaze, Matt1
Diffie, Whitfield2
Rivest, Ronald L.3
Schneier, Bruce4
Shimomura, Tsutomu5
Thompson, Eric6
Wiener, Michael7
-
13
-
-
0004145058
-
-
Secure Networks, Inc. (January)
-
Thomas H. Ptacek and Timothy N. Newsham, Insertion, Deletion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks, Inc. (January, 1998).
-
(1998)
Insertion, Deletion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, Thomas H.1
Newsham, Timothy N.2
|