-
1
-
-
0004035649
-
-
RFC 2246, January [Online]. Available
-
T. Dierks and C. Allen, "The TLS protocol version 1.0," RFC 2246, January 1999. [Online]. Available: ftp://ftp.isi.edu/in-notes/rfc2246.txt
-
(1999)
The TLS Protocol Version 1.0
-
-
Dierks, T.1
Allen, C.2
-
2
-
-
0031612427
-
Decentralized user-role assignment for web-based intranets
-
[Online]. Available
-
R. S. Sandhu and J. S. Park, "Decentralized user-role assignment for web-based intranets," in ACM Workshop on Role-Based Access Control, 1998, pp. 1-12. [Online]. Available: citeseer.nj.nec.com/sandhu98decentralized.html
-
ACM Workshop on Role-Based Access Control, 1998
, pp. 1-12
-
-
Sandhu, R.S.1
Park, J.S.2
-
4
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
[Online]. Available
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion routing for anonymous and private internet connections," Communications of the ACM (USA), vol. 42, no. 2, pp. 39-41, 1999. [Online]. Available: citeseer.nj.nec.com/goldschlag99onion.html
-
(1999)
Communications of the ACM (USA)
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
5
-
-
0013243382
-
-
World Wide Web Consortium (W3C), Tech. Rep.
-
L. Cranor, M. Langheinrich, M. Massimo, M. Presler-Marshall, and J. Reagle, "The Platform for Privacy Preferences 1.0 (P3P1.0) Specification," World Wide Web Consortium (W3C), Tech. Rep., 2002.
-
(2002)
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification
-
-
Cranor, L.1
Langheinrich, M.2
Massimo, M.3
Presler-Marshall, M.4
Reagle, J.5
-
7
-
-
85180777711
-
An Algebraic Approach to IP Traceback
-
D. Dean, M. Franklin, and A. Stubblefield, "An Algebraic Approach to IP Traceback," in Proc. of the Network and Dsitributed System Security Symposium (NDSS), February 2001, pp. 3-12.
-
Proc. of the Network and Dsitributed System Security Symposium (NDSS), February 2001
, pp. 3-12
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
8
-
-
0035361712
-
Network Support for IP Traceback
-
June
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network Support for IP Traceback," ACM/IEEE Transactions on Networking, vol. 9, no. 3, pp. 226-237, June 2001.
-
(2001)
ACM/IEEE Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
9
-
-
33744945767
-
SOS: Secure Overlay Services
-
A. D. Keromytis, V. Misra, and D. Rubenstein, "SOS: Secure Overlay Services," in Proceedings of ACM SIGCOMM, August 2002, pp. 61-72.
-
Proceedings of ACM SIGCOMM, August 2002
, pp. 61-72
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
10
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, "Chord: A scalable peer-to-peer lookup service for internet applications," in Proceedings of ACM SIGCOMM, San Diego, CA, August 2001.
-
Proceedings of ACM SIGCOMM, San Diego, CA, August 2001
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, F.4
Balakrishnan, H.5
-
11
-
-
12144291755
-
A Blueprint for Introducing Disruptive Technology into the Internet
-
[Online]. Available
-
L. Peterson, D. Culler, T. Anderson, and T. Roscoe, "A Blueprint for Introducing Disruptive Technology into the Internet," in Proceedings of the 1st Workshop on Hot Topics in Networks (HotNets-I), October 2002. [Online]. Available: citeseer.nj.nec.com/peterson02blueprint.html
-
Proceedings of the 1st Workshop on Hot Topics in Networks (HotNets-I), October 2002
-
-
Peterson, L.1
Culler, D.2
Anderson, T.3
Roscoe, T.4
-
12
-
-
0034449536
-
Implementing a Distributed Firewall
-
S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith, "Implementing a Distributed Firewall," in Proceedings of Computer and Communications Security (CCS), November 2000, pp. 190-199.
-
Proceedings of Computer and Communications Security (CCS), November 2000
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.2
Bellovin, S.3
Smith, J.4
-
13
-
-
0030704545
-
Consistent Hashing and Random Trees: Distributed Caching Protocols for Relievig Hot Spots on the World Wide Web
-
[Online]. Available
-
D. Karger, B. Lehman, F. Leighton, R. Panigrahy, M. Levine, and D. Lewin, "Consistent Hashing and Random Trees: Distributed Caching Protocols for Relievig Hot Spots on the World Wide Web," in Proceedings of ACM Symposium on Theory of Computing (STOC), May 1997, pp. 654-663. [Online]. Available: citeseer.nj.nec.com/karger97consistent.html
-
Proceedings of ACM Symposium on Theory of Computing (STOC), May 1997
, pp. 654-663
-
-
Karger, D.1
Lehman, B.2
Leighton, F.3
Panigrahy, R.4
Levine, M.5
Lewin, D.6
-
14
-
-
0012736571
-
-
RFC 2784, March [Online]. Available
-
D. Farinacci, T. Li, S. Hanks, D. Meyer, and P. Traina, "Generic Routing Encapsulation (GRE)," RFC 2784, March 2000. [Online]. Available: http://www.rfc-editor.org/rfc/rfc2784.txt
-
(2000)
Generic Routing Encapsulation (GRE)
-
-
Farinacci, D.1
Li, T.2
Hanks, S.3
Meyer, D.4
Traina, P.5
-
16
-
-
0011917214
-
-
CCITT, International Telecommunications Union, Geneva
-
CCITT, X.509: The Directory Authentication Framework, International Telecommunications Union, Geneva, 1989.
-
(1989)
X.509: The Directory Authentication Framework
-
-
-
17
-
-
0001983901
-
A Scalable Content-Addressable Network
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A Scalable Content-Addressable Network," in Proceedings of ACM SIGCOMM, San Diego, CA, August 2001.
-
Proceedings of ACM SIGCOMM, San Diego, CA, August 2001
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
18
-
-
85084162744
-
A Study of the Relative Costs of Network Security Protocols
-
S. Miltchev, S. Ioannidis, and A. Keromytis, "A Study of the Relative Costs of Network Security Protocols," in Proceedings of USENIX Annual Technical Conference (Freenix track), June 2002, pp. 41-48.
-
Proceedings of USENIX Annual Technical Conference (Freenix Track), June 2002
, pp. 41-48
-
-
Miltchev, S.1
Ioannidis, S.2
Keromytis, A.3
-
19
-
-
85034043506
-
Protecting web servers from distributed denial of service attacks
-
[Online]. Available
-
F. Kargl, J. Maier, and M. Weber, "Protecting web servers from distributed denial of service attacks," in Proceedings of the World Wide Web Conference, 2001, pp. 514-524. [Online]. Available: citeseer.nj.nec.com/ 444367.html
-
Proceedings of the World Wide Web Conference, 2001
, pp. 514-524
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
|