-
1
-
-
77955030312
-
-
accessed June 2005
-
Anatomy of an arp poisoning attack. http://www.watchguard.com/infocenter/ editorial/135324.asp, accessed June 2005.
-
Anatomy of an arp poisoning attack
-
-
-
4
-
-
33846317656
-
-
C. Adams and R. Zuccherato. A General, Flexible Approach to Certificate Revocation, June 1998. http://www.entrust.com/securityzone/whitepapers.htm.
-
C. Adams and R. Zuccherato. A General, Flexible Approach to Certificate Revocation, June 1998. http://www.entrust.com/securityzone/whitepapers.htm.
-
-
-
-
5
-
-
11244282960
-
Origin Authentication in Interdomain Routing
-
ACM, October, Washington, DC
-
W. Aiello, J. Ioannidis, and P. McDaniel. Origin Authentication in Interdomain Routing. In Proceedings of 10th ACM Conference on Computer and Communications Security, pages 165-178. ACM, October 2003. Washington, DC.
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security
, pp. 165-178
-
-
Aiello, W.1
Ioannidis, J.2
McDaniel, P.3
-
6
-
-
33144488680
-
-
RFC 4034, Internet Engineering Task Force, March
-
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. RFC 4034, Resource Records for the DNS Security Extensions. Internet Engineering Task Force, March 2005.
-
(2005)
Resource Records for the DNS Security Extensions
-
-
Arends, R.1
Austein, R.2
Larson, M.3
Massey, D.4
Rose, S.5
-
7
-
-
33144481198
-
-
RFC 4035, Internet Engineering Task Force, March
-
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. RFC 4035, Protocol Modifications for the DNS Security Extensions. Internet Engineering Task Force, March 2005.
-
(2005)
Protocol Modifications for the DNS Security Extensions
-
-
Arends, R.1
Austein, R.2
Larson, M.3
Massey, D.4
Rose, S.5
-
8
-
-
0002738343
-
Security problems in the tcp/ip protocol suite
-
April
-
S. M. Bellovin. Security problems in the tcp/ip protocol suite. Computer Communications Review, 2(19):32-48, April 1989.
-
(1989)
Computer Communications Review
, vol.2
, Issue.19
, pp. 32-48
-
-
Bellovin, S.M.1
-
14
-
-
33846319919
-
-
access points and arp poisoning: Wireless vulnerabilities that expose the wired network
-
B. Fleck and J. Dimov. Wireless access points and arp poisoning: Wireless vulnerabilities that expose the wired network. http://downloads.securityfocus. com/library/arppoison.pdf.
-
Wireless
-
-
Fleck, B.1
Dimov, J.2
-
16
-
-
0037437630
-
A secure address resolution protocol
-
January
-
M. Gouda, and C. Huang. A secure address resolution protocol. Computer Networks, 41:860-921, January 2003.
-
(2003)
Computer Networks
, vol.41
, pp. 860-921
-
-
Gouda, M.1
Huang, C.2
-
17
-
-
0033716998
-
Generalized certificate revocation
-
New York, NY, USA, ACM Press
-
C. A. Gunter and T. Jim. Generalized certificate revocation. In POPL '00: Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 316-329, New York, NY, USA, 2000. ACM Press.
-
(2000)
POPL '00: Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 316-329
-
-
Gunter, C.A.1
Jim, T.2
-
18
-
-
0003900673
-
-
RFC 2459, Internet Engineering Task Force, January
-
R. Housley, W. Ford, W. Polk, and D. Solo. RFC 2459, Internet X.509 Public Key Infrastructure Certificate and CRL Profile. Internet Engineering Task Force, January 1999.
-
(1999)
Internet X.509 Public Key Infrastructure Certificate and CRL Profile
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
20
-
-
84958063551
-
-
P. Kocher. On Certificate Revocation and Validation. In R. Hirschfeld, editor, Financial Cryptography FC '98, 1465, pages 172-177, Anguilla, British West Indies, February 1998. Springer.
-
P. Kocher. On Certificate Revocation and Validation. In R. Hirschfeld, editor, Financial Cryptography FC '98, volume 1465, pages 172-177, Anguilla, British West Indies, February 1998. Springer.
-
-
-
-
21
-
-
33846319235
-
-
L. B. N. L. (LBNL). Arpwatch: Ethernet monitor program. http://www-nrg.ee.lbl.gov, accessed May 2005.
-
L. B. N. L. (LBNL). Arpwatch: Ethernet monitor program. http://www-nrg.ee.lbl.gov, accessed May 2005.
-
-
-
-
23
-
-
50049126374
-
Experimenting with shared generation of rsa keys
-
Internet Society, February, San Diego, CA
-
M. Malkin, T. D. Wu, and D. Boneh. Experimenting with shared generation of rsa keys. In Proceedings of Network and Distributed Systems Security 1999. Internet Society, February 1999. San Diego, CA.
-
(1999)
Proceedings of Network and Distributed Systems Security 1999
-
-
Malkin, M.1
Wu, T.D.2
Boneh, D.3
-
24
-
-
0033885757
-
Windowed Certificate Revocation
-
IEEE, March, Tel Aviv, Israel
-
P. McDaniel and S. Jamin. Windowed Certificate Revocation. In Proceedings of IEEE INFOCOM 2000, pages 1406-1414. IEEE, March 2000. Tel Aviv, Israel.
-
(2000)
Proceedings of IEEE INFOCOM 2000
, pp. 1406-1414
-
-
McDaniel, P.1
Jamin, S.2
-
25
-
-
0003267027
-
A Response to 'Can We Eliminate Certificate Revocation Lists?
-
International Financial Cryptography Association IFCA, February, Anguilla, British West Indies
-
P. McDaniel and A. Rubin. A Response to 'Can We Eliminate Certificate Revocation Lists?'. In Proceedings of Financial Cryptography 2000. International Financial Cryptography Association (IFCA), February 2000. Anguilla, British West Indies.
-
(2000)
Proceedings of Financial Cryptography 2000
-
-
McDaniel, P.1
Rubin, A.2
-
26
-
-
0004179384
-
Efficient Certificate Revocation
-
MIT/LCS/TM-542b, Massachusetts Institute of Technology
-
S. Micali. Efficient Certificate Revocation. Technical Report Technical Memo MIT/LCS/TM-542b, Massachusetts Institute of Technology, 1996.
-
(1996)
Technical Report Technical Memo
-
-
Micali, S.1
-
28
-
-
84958056811
-
-
M. Myers. Revocation: Options and Challenges. In R. Hirschfeld, editor, Financial Cryptography FC '98, 1465, pages 165-171, Anguilla, British West Indies, February 1998. Springer.
-
M. Myers. Revocation: Options and Challenges. In R. Hirschfeld, editor, Financial Cryptography FC '98, volume 1465, pages 165-171, Anguilla, British West Indies, February 1998. Springer.
-
-
-
-
29
-
-
0004115865
-
-
RFC 2560, Internet Engineering Task Force, June
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. Internet Engineering Task Force, June 1999.
-
(1999)
X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
33
-
-
0003535506
-
-
RFC 2865, Internet Engineering Task Force, June
-
C. Rigney, S. Willens, A. Rubens, and W Simpson. RFC 2865, remote authentication dial in user service (RADIUS). Internet Engineering Task Force, June 2000.
-
(2000)
remote authentication dial in user service (RADIUS)
-
-
Rigney, C.1
Willens, S.2
Rubens, A.3
Simpson, W.4
-
34
-
-
33846324226
-
-
R. Rivest and B. Lampson. SDSI A Simple Distributed Security Infrastructure, October 1996. http://theory.lcs.mit.edu/~rivest/sdsi11.html.
-
R. Rivest and B. Lampson. SDSI A Simple Distributed Security Infrastructure, October 1996. http://theory.lcs.mit.edu/~rivest/sdsi11.html.
-
-
-
-
35
-
-
84861242278
-
-
packet construction library
-
M. Schiffman. The libnet packet construction library. http://www.packetfactory.net/libnet/.
-
The libnet
-
-
Schiffman, M.1
-
37
-
-
33846316960
-
-
D. Song, dsniff: a collection of tools for network auditing and penetration testing, http://www.monkey.org/dugsong/dsniff, accessed May 2005.
-
D. Song, dsniff: a collection of tools for network auditing and penetration testing, http://www.monkey.org/dugsong/dsniff, accessed May 2005.
-
-
-
-
39
-
-
85084164692
-
SSH - Secure Login Connections Over the Internet
-
USENIX Association, June, San Jose, CA
-
T. Ylonen. SSH - Secure Login Connections Over the Internet. In Proceedings of 6th USENIX UNIX Security Symposium, pages 37-42. USENIX Association, June 1996. San Jose, CA.
-
(1996)
Proceedings of 6th USENIX UNIX Security Symposium
, pp. 37-42
-
-
Ylonen, T.1
|