-
2
-
-
0242456143
-
NATE-network analysis of anomalous traffic events, A low-cost approach
-
September
-
C. Taylor, J. Alves-Foss, NATE-Network Analysis of Anomalous Traffic Events, A Low-cost Approach, Proceedings of the New Security Paradigms Workshop '01, pp 89-96, September 2001.
-
(2001)
Proceedings of the New Security Paradigms Workshop '01
, pp. 89-96
-
-
Taylor, C.1
Alves-Foss, J.2
-
3
-
-
3042635764
-
Identifying outliers via clustering for anomaly detection
-
Dept. of Computer Science, Florida Institute of Technology
-
M. Arshad, P. Chan, Identifying Outliers via Clustering for Anomaly Detection, Technical Report CS-2003-19, Dept. of Computer Science, Florida Institute of Technology, 2003.
-
(2003)
Technical Report
, vol.CS-2003-19
-
-
Arshad, M.1
Chan, P.2
-
6
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R.M. Needham, M.D. Schroeder, Using Encryption for Authentication in Large Networks of Computers, Communications of ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
7
-
-
0020720357
-
On the security of public key protocols
-
March
-
D. Dolev, A. Yao, On the Security of Public Key Protocols, IEEE Transactions on Information Theory, 29(2): 198-208, March 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
8
-
-
0023295108
-
The interrogator: Protocol security analysis
-
Feb.
-
J.K. Millen, S.C. Clark, S.B. Freedman, The interrogator: Protocol Security Analysis, IEEE Transaction Software Engineering, SE-13(2):274-288, Feb. 1987.
-
(1987)
IEEE Transaction Software Engineering
, vol.SE-13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
9
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
C. Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol, Journal of Computer Security, 1:5-53, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, pp. 5-53
-
-
Meadows, C.1
-
10
-
-
0342658605
-
Breaking and fixing the needham-schroeder public key protocol using FDR, tools and algorithms for the construction and analysis of systems
-
Springer-Verlag
-
G. Lowe, Breaking and Fixing the Needham-Schroeder Public Key Protocol using FDR, Tools and Algorithms for the Construction and Analysis of Systems, Volume 1055 of Lecture Notes in Computer Science, pp. 147-156, Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-156
-
-
Lowe, G.1
-
12
-
-
0032678887
-
Athena - An automatic checker for security protocol analysis
-
Mordano, Italy, June
-
D. Song, Athena - An Automatic Checker for Security Protocol Analysis, Proc. Computer Security Foundation Workshop, Mordano, Italy, June 1999.
-
(1999)
Proc. Computer Security Foundation Workshop
-
-
Song, D.1
-
13
-
-
0032671775
-
A metanotaion for protocol analysis
-
IEEE Computer Society Press, June
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, A. Scedrov, A Metanotaion for Protocol Analysis, Proc. 12th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, June 1999.
-
(1999)
Proc. 12th IEEE Computer Security Foundations Workshop
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
14
-
-
0001924088
-
A model for secure protocols and their composition
-
January
-
N. Heintze, J.D. Tygar, A Model for Secure Protocols and their Composition, IEEE Transactions on Software Engineering, 22(1): 16-30, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 16-30
-
-
Heintze, N.1
Tygar, J.D.2
-
15
-
-
0034593312
-
Dynamic analysis of security protocols
-
Sept 18-21, Ballycotton, Ireland
-
A. Yasinsac, Dynamic Analysis of Security Protocols, Proceedings of New Security Paradigms 2000 Workshop, Sept 18-21, Ballycotton, Ireland, pp. 77-87, 2000.
-
(2000)
Proceedings of New Security Paradigms 2000 Workshop
, pp. 77-87
-
-
Yasinsac, A.1
-
16
-
-
0036090428
-
An environment for security protocol intrusion detection
-
January
-
A. Yasinsac, An Environment for Security Protocol Intrusion Detection, Journal of Computer Security, January 2002.
-
(2002)
Journal of Computer Security
-
-
Yasinsac, A.1
-
18
-
-
3042682609
-
-
PortSentry, by Psionic Technologies
-
PortSentry, by Psionic Technologies.
-
-
-
-
20
-
-
84862384608
-
-
The LaBrea Project, Sourceforge, http://labrea.sourceforge.net.
-
-
-
-
21
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusions, ACM Computer and Communication Security Conference, 2002.
-
(2002)
ACM Computer and Communication Security Conference
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
23
-
-
3042596114
-
-
Swiss Federal Institute of Technology (EPFL) - LASEC Memo
-
B. Canvel, A. Hiltgen, S. Vaudenay, M. Vuagnoux, Password Interception in SSL/TLS Channel, Swiss Federal Institute of Technology (EPFL) - LASEC, Memo, 2003.
-
(2003)
Password interception in SSL/TLS Channel
-
-
Canvel, B.1
Hiltgen, A.2
Vaudenay, S.3
Vuagnoux, M.4
-
24
-
-
3042644464
-
-
V. Klima, O. Pokorny, T. Rosa, Czech Technical University in Prague, 2003
-
V. Klima, O. Pokorny, T. Rosa, Czech Technical University in Prague, 2003.
-
-
-
-
25
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1
-
D. Bleichenbacher, Chosen Ciphertext Attacks against Protocols based on the RSA Encryption Standard PKCS#1, Proceedings of CRYPTO'98, pp 1-12, 1998.
-
(1998)
Proceedings of CRYPTO'98
, pp. 1-12
-
-
Bleichenbacher, D.1
-
26
-
-
84946432389
-
Analysis of the SSL 3.0 protocol
-
USENIX Press, November
-
D. Wagner, B. Schneier, Analysis of the SSL 3.0 Protocol, Proceedings of Second USENIX Workshop on Electronic Commerce, USENIX Press, pp. 29-40., November 1996.
-
(1996)
Proceedings of Second USENIX Workshop on Electronic Commerce
, pp. 29-40
-
-
Wagner, D.1
Schneier, B.2
-
27
-
-
3042541187
-
OpenSSL servers contain a buffer overflow during the SSL2 handshake process
-
July
-
CERT Vulnerability Note, " OpenSSL servers contain a buffer overflow during the SSL2 handshake process", July 2002.
-
(2002)
CERT Vulnerability Note
-
-
-
28
-
-
23844467959
-
OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake process
-
July
-
CERT Vulnerability Note, " OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake process", July 2002.
-
(2002)
CERT Vulnerability Note
-
-
|