-
1
-
-
85084160050
-
Problem areas for the IP security protocols
-
July (Available: ftp://ftp.research.att.com/dist/smb/badesp.ps.)
-
S. M. Bellovin, "Problem areas for the IP security protocols," in Proc. 6th Usenix UNIX Security Symp., July 1996. (Available: ftp://ftp.research.att.com/dist/smb/badesp.ps.)
-
(1996)
Proc. 6th Usenix UNIX Security Symp.
-
-
Bellovin, S.M.1
-
2
-
-
33646934849
-
Network and Internet security
-
A. B. Tucker, Jr., Ed. Boca Raton, FL: CRC Press, ch. 92
-
_, "Network and Internet security," The Computer Science and Engineering Handbook, A. B. Tucker, Jr., Ed. Boca Raton, FL: CRC Press, 1997, ch. 92, pp. 1949-1961.
-
(1997)
The Computer Science and Engineering Handbook
, pp. 1949-1961
-
-
-
5
-
-
33646916492
-
TCP SYN flooding and IP spoofing attacks
-
CERT advisory 96.21, Sept. (Available: ftp://info.cert.org/pub/cert-advisories/CA" ~96.21 .tcp-synJlooding.)
-
'TCP SYN flooding and IP spoofing attacks," Computer Emergency Response Team, CERT advisory 96.21, Sept. 1996. (Available: ftp://info.cert.org/pub/cert-advisories/CA" ~96.21 .tcp-synJlooding.)
-
(1996)
Computer Emergency Response Team
-
-
-
7
-
-
33646901481
-
-
Englewood Cliffs, NJ: Prentice-Hall
-
D. E. Comer, Internenvorking with TCP/IP, vol. I. Englewood Cliffs, NJ: Prentice-Hall, 1991.
-
(1991)
Internenvorking with TCP/IP
, vol.1
-
-
Comer, D.E.1
-
8
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffic and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.VOL. IT-22
, pp. 644-654
-
-
Diffic, W.1
Hellman, M.E.2
-
10
-
-
33646918203
-
Malicious software and hacking
-
A. B. Tucker, Jr., Ed. CRC Press, ch. 93
-
D. Ferbrache and S. Mort, "Malicious software and hacking," in The Computer Science anil Engineering Handbook, A. B. Tucker, Jr., Ed. CRC Press, 1997, ch. 93, pp. 1962-1979.
-
(1997)
The Computer Science Anil Engineering Handbook
, pp. 1962-1979
-
-
Ferbrache, D.1
Mort, S.2
-
11
-
-
0004249393
-
The SSL protocol, version 3.0
-
Nov. 18, (Available: http://ds.intemic.net/internet-drafts/draft-ietf-tls-ssl-version3-00.txt.)
-
A. O. Freier, P. Karlton, and P. Kocher, "The SSL protocol, version 3.0," Internet Engineering Task Force, Internet draft draft-ietf-tls-ssl-version3-00.txt, Nov. 18, 1996. (Available: http://ds.intemic.net/internet-drafts/draft-ietf-tls-ssl-version3-00.txt.)
-
(1996)
Internet Engineering Task Force, Internet Draft Draft-ietf-tls-ssl-version3-00.txt
-
-
Freier, A.O.1
Karlton, P.2
Kocher, P.3
-
12
-
-
33646940293
-
Definition of Internet.
-
Oct. 24
-
Definition of "Internet." (Oct. 24, 1995). Federal Networking Council Resolution. [Online]. Available: http://www.fnc.gov/Internet .res.html.)
-
(1995)
Federal Networking Council Resolution.
-
-
-
14
-
-
0021510842
-
UNIX operating system security
-
Oct.
-
F. T. Grarnpp and R. H. Morris, "UNIX operating system security," AT&T Bell Labs. Tech. J., vol. 63, no. 8, pp. 1649-1672, Oct. 1984.
-
(1984)
AT&T Bell Labs. Tech. J.
, vol.63
, Issue.8
, pp. 1649-1672
-
-
Grarnpp, F.T.1
Morris, R.H.2
-
15
-
-
0003048077
-
The S/key one-time password system
-
San Diego, CA, Feb.
-
N. M. Haller, "The S/key one-time password system," in Proc. Internet Society Symp. Network and Distributed System Security, San Diego, CA, Feb. 1994, pp. 151-157.
-
(1994)
Proc. Internet Society Symp. Network and Distributed System Security
, pp. 151-157
-
-
Haller, N.M.1
-
16
-
-
0242666599
-
-
Computer Science Department, Purdue University, West Lafayette, IN, Purdue Tech. Rep. CSD-TR-94-019, Mar. 12, This report and much relevant information is available at the COAST computer security archive, http://www.cs.purdue.edu/coastJ.
-
G. H. Kim and E. H. Spafford, "Writing, supporting, and evaluating tripwire: A publicly available security tool," Computer Science Department, Purdue University, West Lafayette, IN, Purdue Tech. Rep. CSD-TR-94-019, Mar. 12, 1994. This report and much relevant information is available at the COAST computer security archive, http://www.cs.purdue.edu/coastJ.
-
(1994)
Writing, Supporting, and Evaluating Tripwire: a Publicly Available Security Tool
-
-
Kim, G.H.1
Spafford, E.H.2
-
18
-
-
0015672289
-
A note on the confinement problem
-
B. Lampson, "A note on the confinement problem," Commun. ACM. vol. 16, no. 10, pp. 613-615, 1973.
-
(1973)
Commun. ACM.
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
19
-
-
0842305607
-
Protection (security) models and policy
-
A. B. Tucker, Jr., Ed. CRC Press, ch. 90
-
C. E. Landwehr, "Protection (security) models and policy," in The Computer Science and Engineering Handbook, A. B. Tucker, Jr., Ed. CRC Press, 1997, ch. 90, pp. 1914-1928.
-
(1997)
The Computer Science and Engineering Handbook
, pp. 1914-1928
-
-
Landwehr, C.E.1
-
20
-
-
0028514027
-
A taxonomy of computer program security flaws
-
Sept.
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi, "A taxonomy of computer program security flaws," ACM Comput. Suneys, vol. 26, no. 3, pp. 211-254, Sept. 1994.
-
(1994)
ACM Comput. Suneys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
24
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
26
-
-
0003757661
-
Domain names-Implementation and specification
-
Nov.
-
_, "Domain names-Implementation and specification," Internet Engineering Task Force, RFC 1035, Nov. 1987.
-
(1987)
Internet Engineering Task Force, RFC 1035
-
-
-
32
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
C. L. Schuba, I. V. Krsul, M. G. Kühn, E. H. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on TCP," in Proc. 1997 lEEESymp. Security and Privacy, Oakland, CA, pp. 208-223.
-
Proc. 1997 LEEESymp. Security and Privacy, Oakland, CA
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kühn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
33
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
J. Steiner, B. C. Neuman, and J. I. Schiller, "Kerberos: An authentication service for open network systems," in Proc. Winter USENIX Conf.. Dallas, TX, 1988, pp. 191-202.
-
(1988)
Proc. Winter USENIX Conf.. Dallas, TX
, pp. 191-202
-
-
Steiner, J.1
Neuman, B.C.2
Schiller, J.I.3
-
34
-
-
0030676973
-
Anonymous connections and onion routing
-
See also http://www.itd.nrl.navy.mil/ITD/5540/projects/onion-routing/.
-
P. F. Syverson, D. M. Goldschlag, and M. G. Reed, "Anonymous connections and onion routing," in Proc. 1997 IEEE Symp. Security and Privacy, Oakland, CA, pp. 44-54. See also http://www.itd.nrl.navy.mil/ITD/5540/projects/onion-routing/.
-
Proc. 1997 IEEE Symp. Security and Privacy, Oakland, CA
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
35
-
-
33646914848
-
Dynamic updates in the domain name system
-
P. Vixie, Ed., July 14
-
S. Thomson, Y. Rekhter, and J. Bound, "Dynamic updates in the domain name system," Internet Engineering Task Force, Internet draft draft-ietf-dnsind-dynDNS-11.txt, P. Vixie, Ed., July 14, 1994.
-
(1994)
Internet Engineering Task Force, Internet Draft Draft-ietf-dnsind-dynDNS-11.txt
-
-
Thomson, S.1
Rekhter, Y.2
Bound, J.3
-
37
-
-
33646933415
-
Security holes threaten Microsoft game plan
-
Mar. 28
-
_, "Security holes threaten Microsoft game plan," The New York Times, Mar. 28, 1997.
-
(1997)
The New York Times
-
-
-
40
-
-
0024087662
-
Evolution of the MOS transistor-From conception to VLSI
-
C. T. Sah, "Evolution of the MOS transistor-From conception to VLSI," Proc. IEEE, vol. 76, pp. 1280-1326, 1988.
-
(1988)
Proc. IEEE
, vol.76
, pp. 1280-1326
-
-
Sah, C.T.1
|