-
8
-
-
0003804730
-
-
Technical Report 117, AT and T Bell Laboratories, Murray Hill, New Jersey 07974, Feb.
-
R.T. Morris, A Weakness in the 4.2BSD Unix TCP/IP Software. Technical Report 117, AT and T Bell Laboratories, Murray Hill, New Jersey 07974, Feb. 1985. ftp://netlib.att.com/netlib/att/cs/cstr/117.ps.Z.
-
(1985)
A Weakness in the 4.2BSD Unix TCP/IP Software
-
-
Morris, R.T.1
-
10
-
-
0042799568
-
Comments on 'security problems in the TCP/IP protocol suite'
-
S. Kent, Comments on 'security problems in the TCP/IP protocol suite', ACM Computer Commun. Review 19 (3) (1989) 10-19.
-
(1989)
ACM Computer Commun. Review
, vol.19
, Issue.3
, pp. 10-19
-
-
Kent, S.1
-
11
-
-
84976845043
-
End-to-end arguments in system design
-
J.H. Saltzer, D.P. Reed, D.D. Clark, End-to-end arguments in system design, ACM Trans. on Computer Systems 2 (4) (1984) 277-288.
-
(1984)
ACM Trans. on Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
12
-
-
0020762394
-
Security mechanisms in high level network protocols
-
V.L. Voydock, S.T. Kent, Security mechanisms in high level network protocols, ACM Computing Surveys 15 (2) (1983) 135-171.
-
(1983)
ACM Computing Surveys
, vol.15
, Issue.2
, pp. 135-171
-
-
Voydock, V.L.1
Kent, S.T.2
-
13
-
-
0027541184
-
A protocol for route establishment and packet forwarding across multidomain internets
-
D. Estrin, M. Steenstrup, G. Tsudik, A protocol for route establishment and packet forwarding across multidomain internets, IEEE Trans. on Networking 1 (1) (1993) 56-70.
-
(1993)
IEEE Trans. on Networking
, vol.1
, Issue.1
, pp. 56-70
-
-
Estrin, D.1
Steenstrup, M.2
Tsudik, G.3
-
14
-
-
84939353369
-
Security for the DoD transmission control protocol
-
W. Diffie, Security for the DoD Transmission Control Protocol. CRYPTO'85, 1985, pp. 108-127.
-
(1985)
CRYPTO'85
, pp. 108-127
-
-
Diffie, W.1
-
16
-
-
0022090882
-
Standardizing cryptographic services at OSI higher layers
-
J.J. Tardo, Standardizing cryptographic services at OSI higher layers. IEEE Communication Magazine 23 (7) (1985) 25-29.
-
(1985)
IEEE Communication Magazine
, vol.23
, Issue.7
, pp. 25-29
-
-
Tardo, J.J.1
-
19
-
-
0027541191
-
Trust requirements and performance of a fast subtransport-level protocol for secure communication
-
P. Rangan, Trust requirements and performance of a fast subtransport-level protocol for secure communication, IEEE Transactions on Software Engineering 19 (2) (1993) 181-186.
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.2
, pp. 181-186
-
-
Rangan, P.1
-
22
-
-
0012580890
-
Integration of security in network routing protocols
-
B. Kumar, Integration of security in network routing protocols, ACM SIGSAC Review 11 (2) (1993) 18-25.
-
(1993)
ACM SIGSAC Review
, vol.11
, Issue.2
, pp. 18-25
-
-
Kumar, B.1
-
23
-
-
0041296839
-
Integrating security in inter-domain routing protocols
-
B. Kumar, J. Crowcroft, Integrating security in inter-domain routing protocols. ACM Computer Commun. Review, 1993, 36-51.
-
(1993)
ACM Computer Commun. Review
, pp. 36-51
-
-
Kumar, B.1
Crowcroft, J.2
-
24
-
-
0042298471
-
Presentation in panel on 'security architecture for the internet infrastructure'
-
Apr.
-
S.L. Murphy. Presentation in panel on 'security architecture for the internet infrastructure'. Symposium on Network and Distributed System Security, Apr. 1995.
-
(1995)
Symposium on Network and Distributed System Security
-
-
Murphy, S.L.1
|