-
1
-
-
0004093401
-
-
O’Reilly Media, Inc., Sebastopol, CA, Feb
-
D. J. Barrett and R. E. Silverman. SSH, the Secure Shell: The Definitive Guide. O’Reilly Media, Inc., Sebastopol, CA, Feb. 2001.
-
(2001)
SSH, the Secure Shell: The Definitive Guide
-
-
Barrett, D. J.1
Silverman, R. E.2
-
2
-
-
0029238493
-
Improving System Security via Proactive Password Checking
-
M. Bishop and D. V. Klein. Improving System Security via Proactive Password Checking. Computers and Security, 14(3):233–249, 1995.
-
(1995)
Computers and Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D. V.2
-
5
-
-
0016092372
-
A User Authentication Scheme Not Requiring Secrecy in the Computer
-
A. Evans Jr., W. Kantrowitz, and E. Weiss. A User Authentication Scheme Not Requiring Secrecy in the Computer. Communications of the ACM, 17(8):437–442, 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.8
, pp. 437-442
-
-
Evans, A.1
Kantrowitz, W.2
Weiss, E.3
-
7
-
-
0003991982
-
-
O’Reilly Media, Inc., Sebastopol, CA, 3rd edition, Feb
-
S. Garfinkel, G. Spafford, and A. Schwartz. Practical UNIX & Internet Security. O’Reilly Media, Inc., Sebastopol, CA, 3rd edition, Feb. 2003.
-
(2003)
Practical UNIX & Internet Security
-
-
Garfinkel, S.1
Spafford, G.2
Schwartz, A.3
-
8
-
-
85180637211
-
-
San Diego Supercomputer Center (SDSC), Telephone correspondence, Jan. 18
-
V. Hazlewood. Security Technologies Manager, San Diego Supercomputer Center (SDSC), Telephone correspondence, Jan. 18, 2005.
-
(2005)
Security Technologies Manager
-
-
Hazlewood, V.1
-
9
-
-
84878707933
-
-
Internet Assigned Numbers Authority. Internet Protocol v4 Address Space. http://www.iana.org/assignments/ipv4-address-space.
-
Internet Protocol v4 Address Space
-
-
-
10
-
-
78650088153
-
-
Internet Assigned Numbers Authority. IETF, Sept
-
Internet Assigned Numbers Authority. RFC 3330: Special Use IPv4 Addresses. IETF, Sept. 2002.
-
(2002)
RFC 3330: Special Use IPv4 Addresses
-
-
-
12
-
-
31844453927
-
REX: Secure, Extensible Remote Execution
-
June
-
M. Kaminsky, E. Peterson, D. B. Giffin, K. Fu, D. Maziéres, and M. F. Kaashoek. REX: Secure, Extensible Remote Execution. In Proceedings of the 2004 USENIX Annual Technical Conference, pages 199–212, June 2004.
-
(2004)
Proceedings of the 2004 USENIX Annual Technical Conference
, pp. 199-212
-
-
Kaminsky, M.1
Peterson, E.2
Giffin, D. B.3
Fu, K.4
Maziéres, D.5
Kaashoek, M. F.6
-
13
-
-
84900141534
-
Internet Attack Called Broad and Long Lasting by Investigators
-
May 10
-
J. Markoff and L. Bergman. Internet Attack Called Broad and Long Lasting by Investigators. The New York Times, May 10, 2005.
-
(2005)
The New York Times
-
-
Markoff, J.1
Bergman, L.2
-
14
-
-
0018543411
-
Password Security: A Case History
-
R. Morris and K. Thompson. Password Security: A Case History. Communications of the ACM, 22(11):594–597, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
15
-
-
0003629991
-
-
N. I. of Standards and Technology. FIPS PUB 180-1, Apr. 17
-
N. I. of Standards and Technology. Secure Hash Standard. FIPS PUB 180-1, Apr. 17, 1995.
-
(1995)
Secure Hash Standard
-
-
-
17
-
-
85180636008
-
-
Argonne National Laboratory, Email correspondence, Feb. 4
-
S. C. Pinkerton. Network Solutions Manager, Argonne National Laboratory, Email correspondence, Feb. 4, 2005.
-
(2005)
Network Solutions Manager
-
-
Pinkerton, S. C.1
-
23
-
-
0003545819
-
-
Technical Report CSD-TR-823, Purdue University Department of Computer Sciences
-
E. H. Spafford. The Internet Worm Program: An Analysis. Technical Report CSD-TR-823, Purdue University Department of Computer Sciences, 1998.
-
(1998)
The Internet Worm Program: An Analysis
-
-
Spafford, E. H.1
-
24
-
-
85180623629
-
-
SSH Communications Security. May 18
-
SSH Communications Security. Statement: Secure Shell and Address Harvesting. http://www.ssh.com/company/newsroom/20050518_mit.html, May 18, 2005.
-
(2005)
Statement: Secure Shell and Address Harvesting
-
-
-
25
-
-
85180633540
-
-
Symantec. Security response–W32.HLLW.Deloder. http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.deloder.html.
-
Security response–W32.HLLW.Deloder
-
-
-
27
-
-
85180633448
-
-
Symantec. Security Response–W32.Lovgate.mm. http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lovgate@mm.html.
-
Security Response–W32.Lovgate.mm
-
-
-
32
-
-
0038223020
-
-
Technical report, University of California at San Diego Department of Computer Science and Engineering, Nov
-
B. S. Yee and M. Bellare. Forward Integrity for Secure Audit Logs. Technical report, University of California at San Diego Department of Computer Science and Engineering, Nov. 1997.
-
(1997)
Forward Integrity for Secure Audit Logs
-
-
Yee, B. S.1
Bellare, M.2
-
33
-
-
85180625106
-
-
The National Center for Supercomputing Applications (NCSA), Telephone correspondence, Jan. 28
-
W. Yurcik. Senior Systems Security Engineer, The National Center for Supercomputing Applications (NCSA), Telephone correspondence, Jan. 28, 2005.
-
(2005)
Senior Systems Security Engineer
-
-
Yurcik, W.1
|