-
1
-
-
3142632089
-
Just Fast Keying: Key agreement in a hostile Internet
-
May
-
W. Aiello, S. M. Bellovin, M. Blaze, R. Canetti, J. Ioannidis, A. D. Keromytis, and O. Reingold. Just Fast Keying: Key agreement in a hostile Internet. ACM Trans. Inf. Syst. Secur., 7(2):242-273, May 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.2
, pp. 242-273
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
2
-
-
84881252956
-
Lucky thirteen: Breaking the TLS and DTLS record protocols
-
Washington, DC, USA, May IEEE Computer Society Press
-
N. AlFardan and K. Paterson. Lucky thirteen: Breaking the TLS and DTLS record protocols. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, pages 526-540, Washington, DC, USA, May 2013. IEEE Computer Society Press.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy
, pp. 526-540
-
-
AlFardan, N.1
Paterson, K.2
-
3
-
-
48349100653
-
Loss and delay accountability for the internet
-
Washington, DC, USA, IEEE Computer Society Press
-
K. J. Argyraki, P. Maniatis, O. Irzak, S. Ashish, and S. Shenker. Loss and delay accountability for the internet. In Proceedings of the 2007 International Conference on Network Protocols, pages 194-205, Washington, DC, USA, 2007. IEEE Computer Society Press.
-
(2007)
Proceedings of the 2007 International Conference on Network Protocols
, pp. 194-205
-
-
Argyraki, K.J.1
Maniatis, P.2
Irzak, O.3
Ashish, S.4
Shenker, S.5
-
4
-
-
33751508709
-
-
revised. Mar. accessed Aug 26, 2013
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid. Recommendation for key management - Part 1: General (revised). US National Institute of Standards and Technology, Mar. 2007. http://csrc.nist.gov/publications/nistpubs/800-57/ sp800-57-Part1-revised2-Mar08-2007.pdf (accessed Aug 26, 2013).
-
(2007)
Recommendation for Key Management - Part 1: General
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
7
-
-
84866017720
-
The security impact of a new cryptographic library
-
Springer
-
D. J. Bernstein, T. Lange, and P. Schwabe. The security impact of a new cryptographic library. In International Conference on Cryptology and Information Security in Latin America, volume 7533, pages 159-176. Springer, 2012.
-
(2012)
International Conference on Cryptology and Information Security in Latin America
, vol.7533
, pp. 159-176
-
-
Bernstein, D.J.1
Lange, T.2
Schwabe, P.3
-
10
-
-
84889709075
-
The case for ubiquitous transport-level encryption
-
USENIX Association
-
A. Bittau, M. Hamburg, M. Handley, D. Mazières, and D. Boneh. The case for ubiquitous transport-level encryption. In Proceedings of the the 19th USENIX Security Symposium, Berkeley, CA, USA, Aug. 2010. USENIX Association.
-
Proceedings of the the 19th USENIX Security Symposium, Berkeley, CA, USA, Aug. 2010
-
-
Bittau, A.1
Hamburg, M.2
Handley, M.3
Mazières, D.4
Boneh, D.5
-
11
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
-
Washington, DC, USA, May IEEE Computer Society Press
-
J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, pages 553-567, Washington, DC, USA, May 2012. IEEE Computer Society Press.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy
, pp. 553-567
-
-
Bonneau, J.1
Herley, C.2
Van Oorschot, P.C.3
Stajano, F.4
-
12
-
-
77954916419
-
The information visualizer, an information workspace
-
New York, NY, USA, Apr. ACM
-
S. K. Card, G. G. Robertson, and J. D. Mackinlay. The information visualizer, an information workspace. In Proceedings of the 1991 Conference on Human Factors in Computing Systems, pages 181-188, New York, NY, USA, Apr. 1991. ACM.
-
(1991)
Proceedings of the 1991 Conference on Human Factors in Computing Systems
, pp. 181-188
-
-
Card, S.K.1
Robertson, G.G.2
Mackinlay, J.D.3
-
14
-
-
0039136292
-
Internet vulnerabilities related to TCP/IP and T/TCP
-
Jan.
-
M. de Vivo, G. O. de Vivo, R. Koeneke, and G. Isern. Internet vulnerabilities related to TCP/IP and T/TCP. SIGCOMM Comput. Commun. Rev., 29(1):81-85, Jan. 1999.
-
(1999)
SIGCOMM Comput. Commun. Rev.
, vol.29
, Issue.1
, pp. 81-85
-
-
De Vivo, M.1
De Vivo, G.O.2
Koeneke, R.3
Isern, G.4
-
16
-
-
85084161366
-
Tor: The second-generation onion router
-
Berkeley, CA, USA, Aug. USENIX Association
-
R. Dingledine, N. Mathewson, and P. F. Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, pages 303-320, Berkeley, CA, USA, Aug. 2004. USENIX Association.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
20
-
-
84881158647
-
-
accessed Aug 26, 2013
-
Electronic Frontier Foundation. HTTPS everywhere. https://www.eff.org/ https-everywhere (accessed Aug 26, 2013).
-
HTTPS Everywhere
-
-
-
21
-
-
84869487159
-
Why Eve and Mallory love Android: An analysis of Android SSL (in)security
-
New York, NY, USA, ACM
-
S. Fahl, M. Harbach, T. Muders, M. Smith, L. Baumgärtner, and B. Freisleben. Why Eve and Mallory love Android: an analysis of Android SSL (in)security. In Proceedings of the 19th ACM Conference on Computer and Communications Security, pages 50-61, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 19th ACM Conference on Computer and Communications Security
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
Baumgärtner, L.5
Freisleben, B.6
-
23
-
-
57349195123
-
Directions in Internet transport evolution
-
Dec.
-
B. Ford. Directions in Internet transport evolution. IETF Journal, 3(3):29-32, Dec. 2007.
-
(2007)
IETF Journal
, vol.3
, Issue.3
, pp. 29-32
-
-
Ford, B.1
-
24
-
-
36949032297
-
Structured streams: A new transport abstraction
-
New York, NY, USA, ACM
-
B. Ford. Structured streams: a new transport abstraction. In Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, pages 361-372, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 361-372
-
-
Ford, B.1
-
25
-
-
84873963501
-
Non-interactive key exchange
-
Springer
-
E. S. Freire, D. Hofheinz, E. Kiltz, and K. G. Paterson. Non-interactive key exchange. In PKC 2013, volume 7778, pages 254-271. Springer, 2013.
-
(2013)
PKC 2013
, vol.7778
, pp. 254-271
-
-
Freire, E.S.1
Hofheinz, D.2
Kiltz, E.3
Paterson, K.G.4
-
26
-
-
84869429339
-
The most dangerous code in the world: Validating SSL certificates in non-browser software
-
New York, NY, USA, ACM
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. The most dangerous code in the world: validating SSL certificates in non-browser software. In Proceedings of the 19th ACM Conference on Computer and Communications Security, pages 38-49, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 19th ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
27
-
-
84856041489
-
Bufferbloat: Dark buffers in the internet
-
Jan.
-
J. Gettys and K. Nichols. Bufferbloat: dark buffers in the internet. Commun. ACM, 55(1):57-65, Jan. 2012.
-
(2012)
Commun. ACM
, vol.55
, Issue.1
, pp. 57-65
-
-
Gettys, J.1
Nichols, K.2
-
28
-
-
0141427800
-
King: Estimating latency between arbitrary Internet end hosts
-
New York, NY, USA, ACM
-
P. K. Gummadi, S. Saroiu, and S. D. Gribble. King: estimating latency between arbitrary Internet end hosts. In Proceedings of the 2nd Workshop on Internet Measurement, pages 5-18, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the 2nd Workshop on Internet Measurement
, pp. 5-18
-
-
Gummadi, P.K.1
Saroiu, S.2
Gribble, S.D.3
-
29
-
-
33646417370
-
Secure Internet banking authentication
-
March-April
-
A. Hiltgen, T. Kramp, and T. Weigold. Secure Internet banking authentication. IEEE Security Privacy, 4(2):21-29, March-April 2006.
-
(2006)
IEEE Security Privacy
, vol.4
, Issue.2
, pp. 21-29
-
-
Hiltgen, A.1
Kramp, T.2
Weigold, T.3
-
30
-
-
85180745018
-
Implementing pushback: Router-based defense against DDoS attacks
-
The Internet Society
-
J. Ioannidis and S. M. Bellovin. Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of the 9th Network and Distributed System Security Symposium, Reston, VA, USA, Feb. 2002. The Internet Society.
-
Proceedings of the 9th Network and Distributed System Security Symposium, Reston, VA, USA, Feb. 2002
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
31
-
-
85081790830
-
Leveraging IPsec for mandatory access control across systems
-
ACM
-
T. Jaeger, K. Butler, D. H. King, S. Hallyn, J. Latten, and X. Zhang. Leveraging IPsec for mandatory access control across systems. In Proceedings of the 2nd ACM conference on Computer and Communications Security, New York, NY, USA, Aug. 2006. ACM.
-
Proceedings of the 2nd ACM Conference on Computer and Communications Security, New York, NY, USA, Aug. 2006
-
-
Jaeger, T.1
Butler, K.2
King, D.H.3
Hallyn, S.4
Latten, J.5
Zhang, X.6
-
32
-
-
84865461888
-
On the security of TLS-DHE in the standard model
-
Springer
-
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk. On the security of TLS-DHE in the standard model. In Crypto 2012, volume 7417, pages 273-293. Springer, 2012.
-
(2012)
Crypto 2012
, vol.7417
, pp. 273-293
-
-
Jager, T.1
Kohlar, F.2
Schäge, S.3
Schwenk, J.4
-
33
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
The Internet Society
-
A. Juels and J. G. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the 6th Network and Distributed System Security Symposium, Reston, VA, USA, Feb. 1999. The Internet Society.
-
Proceedings of the 6th Network and Distributed System Security Symposium, Reston, VA, USA, Feb. 1999
-
-
Juels, A.1
Brainard, J.G.2
-
35
-
-
84942257511
-
The STRONGMAN architecture
-
A. D. Keromytis, S. Ioannidis, M. B. Greenwald, and J. M. Smith. The STRONGMAN architecture. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, volume 1, pages 178-188, 2003.
-
(2003)
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 178-188
-
-
Keromytis, A.D.1
Ioannidis, S.2
Greenwald, M.B.3
Smith, J.M.4
-
36
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Nov.
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computing Systems, 10(4):265-310, Nov. 1992.
-
(1992)
ACM Transactions on Computing Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
37
-
-
84869395152
-
-
June (accessed Aug 26, 2013)
-
A. Langley. Transport Layer Security (TLS) Snap Start. Internet Engineering Task Force, June 2010. http://tools.ietf.org/html/draft-agl-tls- snapstart-00 (accessed Aug 26, 2013).
-
(2010)
Transport Layer Security (TLS) Snap Start
-
-
Langley, A.1
-
38
-
-
85081801754
-
-
Nov. (accessed Aug 26, 2013)
-
A. Langley. Forward secrecy for Google HTTPS, Nov. 2011. https://www.imperialviolet.org/2011/11/22/forwardsecret.html (accessed Aug 26, 2013).
-
(2011)
Forward Secrecy for Google HTTPS
-
-
Langley, A.1
-
39
-
-
84888989819
-
-
June (accessed Aug 26, 2013)
-
A. Langley. How to botch TLS forward secrecy, June 2013. https://www.imperialviolet.org/2013/06/27/botchingpfs.html (accessed Aug 26, 2013).
-
(2013)
How to Botch TLS Forward Secrecy
-
-
Langley, A.1
-
40
-
-
85081791950
-
Overclocking SSL
-
accessed Aug 26, 2013
-
A. Langley, N. Modadugu, and W.-T. Chang. Overclocking SSL. In Velocity: Web Performance and Operations Conference, Santa Clara, CA, June 2010. http://www.imperialviolet.org/2010/06/25/overclocking-ssl.html (accessed Aug 26, 2013).
-
Velocity: Web Performance and Operations Conference, Santa Clara, CA, June 2010
-
-
Langley, A.1
Modadugu, N.2
Chang, W.-T.3
-
43
-
-
34547350876
-
Inferring the source of encrypted HTTP connections
-
New York, NY, USA, Oct. ACM
-
M. Liberatore and B. N. Levine. Inferring the source of encrypted HTTP connections. In Proceedings of the 13th ACM Conference on Computer and Communications Security, pages 255-263, New York, NY, USA, Oct. 2006. ACM.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
44
-
-
2442425355
-
Integrating flexible support for security policies into the Linux operating system
-
Berkeley, CA, June The USENIX Association
-
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, pages 29-42, Berkeley, CA, June 2001. The USENIX Association.
-
(2001)
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
, pp. 29-42
-
-
Loscocco, P.1
Smalley, S.2
-
47
-
-
84889016049
-
Simple-to-use, secure-by-design networking in Ethos
-
ACM
-
W. M. Petullo and J. A. Solworth. Simple-to-use, secure-by-design networking in Ethos. In Proceedings of the Sixth European Workshop on System Security, New York, NY, USA, Apr. 2013. ACM. https://www.ethos-os.org/papers/.
-
Proceedings of the Sixth European Workshop on System Security, New York, NY, USA, Apr. 2013
-
-
Petullo, W.M.1
Solworth, J.A.2
-
48
-
-
85081801391
-
TCP fast open
-
ACM
-
S. Radhakrishnan, Y. Cheng, J. Chu, A. Jain, and B. Raghavan. TCP fast open. In Proceedings of the 7th International Conference on Emerging Networking Experiments and Technologies, New York, NY, USA, 2011. ACM.
-
Proceedings of the 7th International Conference on Emerging Networking Experiments and Technologies, New York, NY, USA, 2011
-
-
Radhakrishnan, S.1
Cheng, Y.2
Chu, J.3
Jain, A.4
Raghavan, B.5
-
51
-
-
77955457560
-
-
Jan. (accessed Aug 26, 2013)
-
S. Schillace. Default HTTPS access for Gmail, Jan. 2010. http://gmailblog.blogspot.com/2010/01/ default-https-access-for-gmail.html (accessed Aug 26, 2013).
-
(2010)
Default HTTPS Access for Gmail
-
-
Schillace, S.1
-
54
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on SSH
-
USENIX Association
-
D. X. Song, D. Wagner, and X. Tian. Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the 10th USENIX Security Symposium, Berkeley, CA, USA, Aug. 2001. USENIX Association.
-
Proceedings of the 10th USENIX Security Symposium, Berkeley, CA, USA, Aug. 2001
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
55
-
-
84880250920
-
-
July (accessed Aug 26, 2013)
-
S. Souders. Velocity and the bottom line. O'Reilly Media, July 2009. http://programming.oreilly.com/2009/07/ velocity-making-your-site-fast.html (accessed Aug 26, 2013).
-
(2009)
Velocity and the Bottom Line
-
-
Souders, S.1
-
56
-
-
85180758372
-
The case for prefetching and prevalidating TLS server certificates
-
The Internet Society
-
E. Stark, L.-S. Huang, D. Israni, C. Jackson, and D. Boneh. The case for prefetching and prevalidating TLS server certificates. In Proceedings of the 19th Network and Distributed System Security Symposium, Reston, VA, USA, 2012. The Internet Society.
-
Proceedings of the 19th Network and Distributed System Security Symposium, Reston, VA, USA, 2012
-
-
Stark, E.1
Huang, L.-S.2
Israni, D.3
Jackson, C.4
Boneh, D.5
-
59
-
-
85180628784
-
Detecting forged TCP reset packets
-
The Internet Society
-
N. Weaver, R. Sommer, and V. Paxson. Detecting forged TCP reset packets. In Proceedings of the 16th Network and Distributed Systems Security Symposium, Reston, VA, USA, Feb. 2009. The Internet Society.
-
Proceedings of the 16th Network and Distributed Systems Security Symposium, Reston, VA, USA, Feb. 2009
-
-
Weaver, N.1
Sommer, R.2
Paxson, V.3
-
60
-
-
85036476101
-
A high-level framework for network-based resource sharing
-
New York, NY, USA, ACM
-
J. E. White. A high-level framework for network-based resource sharing. In Proceedings of the 1976 National Computer Conference and Exposition, pages 561-570, New York, NY, USA, 1976. ACM.
-
(1976)
Proceedings of the 1976 National Computer Conference and Exposition
, pp. 561-570
-
-
White, J.E.1
-
61
-
-
0027809739
-
Authentication in the Taos operating system
-
New York, NY, USA, ACM
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. In Proceedings of the 14th Symposium on Operating System Principles, pages 256-269, New York, NY, USA, 1993. ACM.
-
(1993)
Proceedings of the 14th Symposium on Operating System Principles
, pp. 256-269
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|