-
1
-
-
84961710277
-
Trading off strength and performance in network authentication: Experience with the ACSA project
-
DISCEX '00
-
Adcock, J.M. Balenson, D.M. Carman, D.W. Heyman, M. Sherman, A.T., "Trading off strength and performance in network authentication: experience with the ACSA project," In Proceedings of DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00.
-
Proceedings of DARPA Information Survivability Conference and Exposition, 2000
-
-
Adcock, J.M.1
Balenson, D.M.2
Carman, D.W.3
Heyman, M.4
Sherman, A.T.5
-
2
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Lecture Notes in Computer Science, Springer-Verlag
-
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, and Phillip Rogaway, "UMAC: Fast and Secure Message Authentication," Advances in Cryptology - CRYPTO '99. Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1999, pp. 216-233.
-
(1999)
Advances in Cryptology - CRYPTO '99
, vol.1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
4
-
-
0242456132
-
Breaking the barriers: High performance security for highPerformance computing
-
Kay Connelly and Andrew A. Chien, "Breaking the Barriers: High Performance Security for HighPerformance Computing," in New Security Paradigms Workshop '02, 2000.
-
(2000)
New Security Paradigms Workshop '02
-
-
Connelly, K.1
Chien, A.A.2
-
5
-
-
85006413597
-
Analyzing distributed denial of service attack tools: The shaft case
-
Sven Dietrich, Neil Long, and David Dittrich, "Analyzing distributed denial of service attack tools: The shaft case," in 14th Systems Administration Conference, LISA 2000, 2000.
-
(2000)
14th Systems Administration Conference, LISA 2000
-
-
Dietrich, S.1
Long, N.2
Dittrich, D.3
-
8
-
-
33746275838
-
Just how secure are security products?
-
Jun.
-
Geer, D. "Just How secure Are security Products?," Computer, Volume 37, Issue 6, Jun. 2004.
-
(2004)
Computer
, vol.37
, Issue.6
-
-
Geer, D.1
-
9
-
-
33746280789
-
Performance analysis of IPSec protocol: Encryption and authentication
-
O. Elkeelnay, M. Mtalgah, K. P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi, J. Qaddour, "Performance Analysis of IPSec Protocol: Encryption and Authentication," In the Proceeding of International Conference on Communication, 2002, 2002.
-
(2002)
The Proceeding of International Conference on Communication, 2002
-
-
Elkeelnay, O.1
Mtalgah, M.2
Sheikh, K.P.3
Thaker, M.4
Chaudhry, G.5
Medhi, D.6
Qaddour, J.7
-
10
-
-
0003272021
-
The Internet Key Exchange (IKE)
-
November
-
D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)", November 1998, RFC 2409.
-
(1998)
RFC
, vol.2409
-
-
Harkins, D.1
Carrel, D.2
-
11
-
-
0002493137
-
Managing security in high- performance distributed computations
-
Ian Foster, Nicholas Karonis, Carl Kesselman and Steven Tuecke, "Managing Security in High- Performance Distributed Computations," Cluster Computing, Vol 1, issue 1, pages 95-107, 1998.
-
(1998)
Cluster Computing
, vol.1
, Issue.1
, pp. 95-107
-
-
Foster, I.1
Karonis, N.2
Kesselman, C.3
Tuecke, S.4
-
12
-
-
0003068282
-
Security architecture for the internet protocol
-
November
-
S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol," November 1998, RFC 2401.
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
13
-
-
0003777824
-
-
Bachelor's thesis, MIT Department of Electrical Engineering, May
-
Kohnfelder, "Toward a Practical Public Key Cryptosystem," Bachelor's thesis, MIT Department of Electrical Engineering, May 1978
-
(1978)
Toward a Practical Public Key Cryptosystem
-
-
Kohnfelder1
-
14
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
February
-
H. Krawczyk, M. Bellare, R. Canetti, "HMAC: Keyed-Hashing for Message Authentication," February 1997, RFC 2104.
-
(1997)
RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
15
-
-
84985822896
-
A fast cryptographic checksum algorithm based on stream ciphers
-
Springer-Verlag
-
X. Lai, R.A. Rueppel, and J. Woollven, "A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers," Advanced in Cryptology-AUSCRYPT '92 Proceedings, Springer-Verlag, 1993, pp. 339-348.
-
(1993)
Advanced in Cryptology-AUSCRYPT '92 Proceedings
, pp. 339-348
-
-
Lai, X.1
Rueppel, R.A.2
Woollven, J.3
-
18
-
-
0042035474
-
Nimda worm analysis
-
Incident Analysis, SecurityFocus, Sept.
-
A. Machie, J. Roculan, R. Russell, and M. V. Velzen, "Nimda Worm Analysis," Tech. Rep., Incident Analysis, SecurityFocus, Sept. 2001.
-
(2001)
Tech. Rep.
-
-
Machie, A.1
Roculan, J.2
Russell, R.3
Velzen, M.V.4
-
19
-
-
85084162744
-
A study of the relative costs of network security protocols
-
Freenix Track, June
-
Stefan Miltchev, Sotiris Ioannidis, "A Study of the Relative costs of Network Security Protocols," In Proceedings of the USENIX Annual Technical Conference, Freenix Track, pages 41-48, June 2002.
-
(2002)
Proceedings of the USENIX Annual Technical Conference
, pp. 41-48
-
-
Miltchev, S.1
Ioannidis, S.2
-
20
-
-
84937352160
-
Cyclic codes for error detection
-
Jan.
-
W. W. Reterson and D.T.Brown, "Cyclic codes for error detection," Proceedings IRE, vol. 49, pp. 228-235, Jan. 1961
-
(1961)
Proceedings IRE
, vol.49
, pp. 228-235
-
-
Reterson, W.W.1
Brown, D.T.2
-
22
-
-
0042035476
-
Code red II worm
-
Incident Analysis, SecurityFocus, Aug.
-
R. Russell and A. Machie, "Code Red II Worm," Tech. Rep., Incident Analysis, SecurityFocus, Aug. 2001.
-
(2001)
Tech. Rep.
-
-
Russell, R.1
Machie, A.2
-
24
-
-
0041534274
-
A snapshot of global internet worm activity
-
Arbor Networks, Nov.
-
D. Song, R. Malan, and R. Stone, "A Snapshot of Global Internet Worm Activity," Tech. Rep., Arbor Networks, Nov.2001.
-
(2001)
Tech. Rep.
-
-
Song, D.1
Malan, R.2
Stone, R.3
-
25
-
-
84898476212
-
An integrity check value algorithm for stream ciphers
-
Springer-Verlag
-
R. Taylor, "An Integrity Check Value Algorithm for Stream Ciphers," Advances in Cryptology-CRYPTO '93 Proceedings, Springer-Verlag, 1994, pp. 40-48.
-
(1994)
Advances in Cryptology-CRYPTO '93 Proceedings
, pp. 40-48
-
-
Taylor, R.1
-
27
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
Jun.
-
Avishai Wool, "A Quantitative Study of Firewall Configuration Errors," Computer, Volume 37, Issue 6, Jun. 2004.
-
(2004)
Computer
, vol.37
, Issue.6
-
-
Wool, A.1
-
28
-
-
20444439981
-
Cluster security as a unique problem with emergent properties: Issues and techniques
-
William Yurcik, G.A.Koenig, X. Meng, J. Greenseid, "Cluster Security as a Unique Problem with Emergent Properties: Issues and Techniques," In Proceedings of Linux Revolution 2004, 2004.
-
(2004)
Proceedings of Linux Revolution 2004
-
-
Yurcik, W.1
Koenig, G.A.2
Meng, X.3
Greenseid, J.4
-
38
-
-
0030149507
-
Cacti: An enhanced cache access and cycle time model
-
May
-
S. Wilton, N. Jouppi, "Cacti: An enhanced cache access and cycle time model," IEEE Journal of Solid-State Circuits, vol. 31, no. 5, May 1996. pp. 677-688.
-
(1996)
IEEE Journal of Solid-state Circuits
, vol.31
, Issue.5
, pp. 677-688
-
-
Wilton, S.1
Jouppi, N.2
|