-
1
-
-
33947182565
-
On the Weakness of Gong's Collisionful Hash Function
-
Springer Pub. Co
-
S.Bakhtiari, R. Safavi-Naini and J. Pieprzyk. On the Weakness of Gong's Collisionful Hash Function. Journal of Universal Computer Science vol 3, no.3, pp 185-196. Springer Pub. Co, 1997.
-
(1997)
Journal of Universal Computer Science
, vol.3
, Issue.3
, pp. 185-196
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
2
-
-
35048878374
-
On Selectable Collisionful Hash Functions
-
The Australian Conference on Information Security and Privacy, Springer Pub. Co.
-
S.Bakhtiari, R. Safavi-Naini and J. Pieprzyk. On Selectable Collisionful Hash Functions. The Australian Conference on Information Security and Privacy, LNCS No. 1172, pp 287-292, Springer Pub. Co., 1996.
-
(1996)
LNCS No. 1172
, vol.1172
, pp. 287-292
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
5
-
-
0003532271
-
UNIX password security - Ten years later
-
Advances in Cryptology CRYPTO 89, Springer cop.
-
D.C. Fieldmeier and P.R. Karn. UNIX password security - ten years later. Advances in Cryptology CRYPTO 89, LNCS 0302-9743; 435 pp:44-63, Springer cop., 1990.
-
(1990)
LNCS
, vol.302-9743
, pp. 44-63
-
-
Fieldmeier, D.C.1
Karn, P.R.2
-
6
-
-
28144460500
-
Collisionful keyed hash functions with selectable collisions
-
Elsevier
-
L. Gong. Collisionful keyed hash functions with selectable collisions. Information Processing Letters 55, pp 167-170, Elsevier, 1995.
-
(1995)
Information Processing Letters
, vol.55
, pp. 167-170
-
-
Gong, L.1
-
7
-
-
84946136376
-
Security Implications of Distributed Intrusion Detection Architectures
-
Stockholm, Sweden
-
H. Hedbom, H. Kvarnström, E. Jonsson. Security Implications of Distributed Intrusion Detection Architectures, In Proceedings of the 4th Nordic Workshop on Secure IT systems - Nordsec 99, pages 225-243; Stockholm, Sweden.
-
Proceedings of the 4th Nordic Workshop on Secure IT Systems - Nordsec 99
, pp. 225-243
-
-
Hedbom, H.1
Kvarnström, H.2
Jonsson, E.3
-
8
-
-
33645763103
-
Risks and Dangers of Security Extensions
-
Bratislava, Slovakia, June 15-16, To appear
-
H. Hedbom, S. Lindskog, E. Jonsson. Risks and Dangers of Security Extensions. In Proceedings of IFIP Working Conference on Security and Control of IT in Society-II, SCITS-II, Bratislava, Slovakia, June 15-16, 2001. To appear
-
(2001)
Proceedings of IFIP Working Conference on Security and Control of IT in Society-II, SCITS-II
-
-
Hedbom, H.1
Lindskog, S.2
Jonsson, E.3
-
10
-
-
0018543411
-
Password security: A case history
-
November
-
R. Morris and K. Thompson. Password security: A case history. Communications of the ACM, 22(11):594-597, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
11
-
-
33645756223
-
Architectures and formal representations for secure systems
-
SRI Project 6401; Deliverable A002
-
P.O. Neumann. "Architectures and formal representations for secure systems", Final Report; SRI Project 6401; Deliverable A002, 1995.
-
(1995)
Final Report
-
-
Neumann, P.O.1
-
14
-
-
0013460160
-
-
Weizmann Institute of Science, Israel; nCipher Corporation Limited, England
-
A. Shamir, Nico van Someren, "Playing hide and seek with stored keys", Weizmann Institute of Science, Israel; nCipher Corporation Limited, England, 1998
-
(1998)
Playing Hide and Seek with Stored Keys
-
-
Shamir, A.1
Van Someren, N.2
-
15
-
-
0004145058
-
-
Secure Networks, Inc.
-
T. H. Ptacek, T. N. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection", Secure Networks, Inc.
-
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
16
-
-
33646449540
-
-
Internet Draft, September
-
S Staniford-Chen, B Tung, P Porras, Cliff Kahn, D Schnackenberg, R Feiertag, M Stillman, The Common Intrusion Detection Framework - Data Formats, Internet Draft, September, 1998.
-
(1998)
The Common Intrusion Detection Framework - Data Formats
-
-
Staniford-Chen, S.1
Tung, B.2
Porras, P.3
Kahn, C.4
Schnackenberg, D.5
Feiertag, R.6
Stillman, M.7
|