-
1
-
-
84889991878
-
The risks of key recovery, key escrow, and trusted third party encryption
-
Abelson, Harold, Ross Anderson, Steven Bellovin, Josh Benaloh, Matt Blaze, Whitfield Die, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, and Bruce Schneier. 1998. The risks of key recovery, key escrow, and trusted third party encryption. Center for Democracy and Technology. www.cdt.org/crypto/risks98.
-
(1998)
Center for Democracy and Technology
-
-
Abelson, H.1
Anderson, R.2
Bellovin, S.3
Benaloh, J.4
Blaze, M.5
Die, W.6
Gilmore, J.7
Neumann, P.G.8
Rivest, R.L.9
Schiller, J.I.10
Schneier, B.11
-
3
-
-
70350750399
-
Advanced SQL injection in SQL server applications
-
Anley, Chris. 2002. Advanced SQL injection in SQL Server applications. Next Generation Security Software, www.ngssoftware.com/papers/advanced-sql- injection.pdf.
-
(2002)
Next Generation Security Software
-
-
Anley, C.1
-
4
-
-
84889977687
-
A new approach to software key escrow encryption
-
New York: Springer-Verlag
-
Balenson, David M., Carl M. Ellison, Steven B. Lipner, and Steven T. Walker. 1994. A new approach to software key escrow encryption. In Building in big brother: The cryptographic policy debate, 180-207. New York: Springer-Verlag.
-
(1994)
Building in Big Brother: The Cryptographic Policy Debate
, pp. 180-207
-
-
Balenson David, M.1
Ellison, C.M.2
Lipner, S.B.3
Walker, S.T.4
-
12
-
-
84889966195
-
Oblivious key escrow. 2002
-
Cambridge, U.K., May 30-June 1, 1996, Proceedings (LNCS 1174) Berlin: SpringerVerlag
-
Blaze, Matt. Oblivious key escrow. 2002. In Information Hiding: First International Workshop, Cambridge, U.K., May 30-June 1, 1996, Proceedings (LNCS 1174), 335-343. Berlin: SpringerVerlag.
-
Information Hiding: First International Workshop
, pp. 335-343
-
-
Matt, B.1
-
13
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
Boneh, Dan. 1999. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS 46 (2): 203-213.
-
(1999)
Notices of the AMS
, vol.46
, Issue.2
, pp. 203-213
-
-
Dan, B.1
-
14
-
-
84889993631
-
-
W3C recommendation, May 12
-
Bos, Bert, Hakon Wium Lie, Chris Lilley, and Ian Jacobs. 1998. Cascading Style Sheets, level 2 (CSS2 specification). W3C recommendation, May 12. www.w3.org/TR/REC-CSS2.
-
(1998)
Cascading Style Sheets, Level 2 (CSS2 Specification)
-
-
Bert, B.1
Lie, H.W.2
Lilley, C.3
Jacobs, I.4
-
16
-
-
17644393012
-
Bypassing StackGuard and stack-shield
-
Bulba and Killar. 2000. Bypassing StackGuard and Stack-Shield. Phrack Magazine 56 (5). www.phrack.org/archives/56/p56-0x05.
-
(2000)
Phrack Magazine
, vol.56
, Issue.5
-
-
Bulba1
Killar2
-
17
-
-
84889994247
-
Cross site reference forgery
-
Burns, Jesse. 2005. Cross site reference forgery. Information Security Partners, www.isecpartners.com/files/XSRF-Paper-0.pdf.
-
(2005)
Information Security Partners
-
-
Burns, J.1
-
18
-
-
4244062863
-
Authenticated byzantine fault tolerance without public-key cryptography
-
MIT Laboratory for Computer Science, June
-
Castro, Miguel, and Barbara Liskov. 1999a. Authenticated Byzantine fault tolerance without public-key cryptography. Technical Memo MIT/LCS/TM-589, MIT Laboratory for Computer Science, June. www.pmg.lcs.mit.edu/~castro/tm589.pdf.
-
(1999)
Technical Memo MIT/LCS/TM-589
-
-
Castro, M.1
Liskov, B.2
-
21
-
-
0019636432
-
Current strategies for computer auditing within an organisation
-
Chambers, A D. 1981. Current strategies for computer auditing within an organisation. Computer Journal 24 (4): 290-294.
-
(1981)
Computer Journal
, vol.24
, Issue.4
, pp. 290-294
-
-
Chambers, A.D.1
-
23
-
-
50149108469
-
-
CNNMoney.com, May 23
-
CNN/Money 2005. Bank security breach may be biggest yet. CNNMoney.com, May 23. http://money.cnn.com/2005/05/23/news/fortune500/bank-info.
-
(2005)
Bank Security Breach May be Biggest Yet
-
-
-
24
-
-
0029732592
-
Non-repudiation with mandatory proof of receipt
-
Coffey, Tom, and Puneet Saidha. 1996. Non-repudiation with mandatory proof of receipt. ACM SIGCOMM Computer Communication Review 26 (1): 6-17.
-
(1996)
ACM SIGCOMM Computer Communication Review
, vol.26
, Issue.1
, pp. 6-17
-
-
Tom, C.1
Saidha, P.2
-
25
-
-
84956860375
-
Experimenting with electronic commerce on the PalmPilot
-
Anguilla, British West Indies, February 1999, Proceedings (LNCS 1648), ed. Matthew K. Franklin Berlin: Springer-Verlag
-
Daswani, Neil, and Dan Boneh. 1999. Experimenting with electronic commerce on the PalmPilot. In Financial Cryptography: Third International Conference, FC '99, Anguilla, British West Indies, February 1999, Proceedings (LNCS 1648), ed. Matthew K. Franklin, 1-16. Berlin: Springer-Verlag.
-
(1999)
Financial Cryptography: Third International Conference, FC '99
, pp. 1-16
-
-
Neil, D.1
Boneh, D.2
-
26
-
-
0020707921
-
Applying the RSA digital signature to electronic mail
-
Davies, Donald W. 1983. Applying the RSA digital signature to electronic mail. IEEE Computer 16 (2): 55-62.
-
(1983)
IEEE Computer
, vol.16
, Issue.2
, pp. 55-62
-
-
Davies Donald, W.1
-
27
-
-
84889961901
-
Quality auditing: The necessary step towards the required quality objectives
-
Stockholm, Sweden, May 1990, Proceedings (LNCS 436), ed. Bo Steinholtz, Arne Solvberg, and Lars Bergman Berlin: Springer-Verlag
-
-. 1990. Quality auditing: The necessary step towards the required quality objectives. In Advanced Information Systems Engineering: Second Nordic Conference CAiSE '90, Stockholm, Sweden, May 1990, Proceedings (LNCS 436), ed. Bo Steinholtz, Arne Solvberg, and Lars Bergman, 286. Berlin: Springer-Verlag.
-
(1990)
Advanced Information Systems Engineering: Second Nordic Conference CAiSE '90
, pp. 286
-
-
Davies Donald, W.1
-
30
-
-
0033293396
-
Towards a taxonomy of intrusiondetection systems
-
Debar, Herve, Marc Dacier, and Andreas Wespi. 1999. Towards a taxonomy of intrusiondetection systems. Computer Networks 31 (8): 805-822.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
34
-
-
84889975749
-
White house web site hacked by anti NATO hactivists?
-
March 30
-
Dennis, Sylvia, and Steve Gold. 1999. White House web site hacked by anti NATO hactivists? Newsbytes, March 30. wwwfindarticles.com/p/articles/mi-m0HDN/ is-1999-March-30/ai-54275915.
-
(1999)
Newsbytes
-
-
Dennis, S.1
Gold, S.2
-
36
-
-
0020097405
-
An efficient algorithm for byzantine agreement without authentication
-
Dolev, Danny, Michael J. Fischer, Rob Fowler, Nancy A Lynch, and H. Raymond Strong. 1982. An efficient algorithm for Byzantine agreement without authentication. Information and Control 52 (3): 257-274.
-
(1982)
Information and Control
, vol.52
, Issue.3
, pp. 257-274
-
-
Dolev, D.1
Fischer, M.J.2
Fowler, R.3
Lynch, N.A.4
Raymond Strong, H.5
-
37
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
Engler, Dawson, Benjamin Chelf, Andy Chou, and Seth Hallem. 2000. Checking system rules using system-specific, programmer-written compiler extensions. In Proceedings of the Fourth USENIX Symposium on Operating System Design and Implementation. www.usenix.org/events/osdi2000/engler/engler.ps.
-
(2000)
Proceedings of the Fourth USENIX Symposium on Operating System Design and Implementation
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
38
-
-
84889957805
-
-
August 3
-
Evers, Joris. 2005. Key bugs in core Linux code squashed. CNET News, August 3. http://news.com.com/Key+bugs+in+core+Linux+code+squashed/2100-1002-3- 5817471.html.
-
(2005)
Key Bugs in Core Linux Code Squashed
-
-
Evers, J.1
-
40
-
-
0003415244
-
-
RFC 2616 (draft standard; updated by RFC 2817), June
-
Fielding, Roy T., James Gettys, Jeffrey C. Mogul, Henrik Frystyk Nielsen, Larry Masinter, Paul J. Leach, and Tim Berners-Lee. 1999. Hypertext Transfer Protocol - HTTP/1.1. RFC 2616 (draft standard; updated by RFC 2817), June. www.ietf.org/rfc/rfc2616.txt?number=2616.
-
(1999)
Hypertext Transfer Protocol - HTTP/1.1
-
-
Fielding Roy, T.1
Gettys, J.2
Mogul, J.C.3
Nielsen, H.F.4
Masinter, L.5
Leach, P.J.6
Tim, B.-L.7
-
42
-
-
0013194031
-
-
RFC 2617 (draft standard), June
-
Franks, John, Phillip Hallam-Baker, Jeffrey Hostetler, Scott D. Lawrence, Paul J. Leach, Ari Luotonen, and Lawrence C. Stewart. 1999a. HTTP authentication: Basic and digest access authentication. RFC 2617 (draft standard), June. http://www.ietf.org/rfc/rfc2617.txt.
-
(1999)
HTTP Authentication: Basic and Digest Access Authentication
-
-
John, F.1
Phillip, H.-B.2
Hostetler, J.3
Lawrence, S.D.4
Leach, P.J.5
Luotonen, A.6
Stewart, L.C.7
-
45
-
-
0029510897
-
Resolving message complexity of byzantine agreement and beyond
-
Oakland, CA IEEE Computer Society Press
-
Galil, Zvi, Alain J. Mayer, and Moti Yung. 1995. Resolving message complexity of Byzantine agreement and beyond. In Proceedings of the 36th Annual Symposium on Foundations of Computer Science, 724-733. Oakland, CA IEEE Computer Society Press.
-
(1995)
Proceedings of the 36th Annual Symposium on Foundations of Computer Science
, pp. 724-733
-
-
Zvi, G.1
Mayer, A.J.2
Yung, M.3
-
48
-
-
33846540174
-
Ajax: A new approach to web applications
-
February 18
-
Garrett, Jesse James. 2005. Ajax: A new approach to web applications. Adaptive Path, February 18 www.adaptivepath.com/publications/essays/archives/ 000385.php.
-
(2005)
Adaptive Path
-
-
Garrett, J.J.1
-
49
-
-
84889990074
-
-
April 21
-
Gonzalez, Guadalupe. 2000. Statement for the record of Guadalupe Gonzalez, Special Agent in Charge, Phoenix Field Division, Federal Bureau of Investigation, on cybercrime, before a special field hearing Senate Committee on Judiciary Subcommittee on Technology, Terrorism, and Government Information, April 21. www.milnet.com/infowar/gonza042100.htm.
-
(2000)
Statement for the Record of Guadalupe Gonzalez, Special Agent in Charge, Phoenix Field Division, Federal Bureau of Investigation, on Cybercrime, Before a Special Field Hearing Senate Committee on Judiciary Subcommittee on Technology, Terrorism, and Government Information
-
-
Gonzalez, G.1
-
50
-
-
84889954513
-
-
Extract from a speech given at the Zurich Seminar, Zurich, Switzerland, April
-
Gordon, John. 1984. The story of Alice and Bob. Extract from a speech given at the Zurich Seminar, Zurich, Switzerland, April. www.conceptlabs.co.uk/ alicebob.html.
-
(1984)
The Story of Alice and Bob
-
-
John, G.1
-
51
-
-
0008629555
-
A comparison of the byzantine agreement problem and the transaction commit problem
-
ed. Barbara Simons and Alfred Spector Berlin: Springer-Verlag
-
Gray, Jim. 1990. A comparison of the Byzantine agreement problem and the transaction commit problem. In Fault-Tolerant Distributed Computing (LNCS 448), ed. Barbara Simons and Alfred Spector, 10-17. Berlin: Springer-Verlag.
-
(1990)
Fault-Tolerant Distributed Computing (LNCS 448)
, pp. 10-17
-
-
Jim, G.1
-
53
-
-
24144435668
-
Hold your sessions: An attack on java session-ID generation
-
San Francisco, California, USA, February 14-18, 2005, Proceedings (LNCS 3376) Berlin: Springer-Verlag
-
Gutterman, Zvi, and Dahlia Malkhi. 2005. Hold your sessions: An attack on Java session-ID generation. In Topics in Cryptography - CT-RSA 2005: The Cryptographers' Track at the RSA Conference 2005, San Francisco, California, USA, February 14-18, 2005, Proceedings (LNCS 3376), 44-57. Berlin: Springer-Verlag.
-
(2005)
Topics in Cryptography - CT-RSA 2005: The Cryptographers' Track at the RSA Conference 2005
, pp. 44-57
-
-
Zvi, G.1
Malkhi, D.2
-
54
-
-
0020802462
-
Audit considerations in distributed processing systems
-
Hansen, James V 1983. Audit considerations in distributed processing systems. Communications of the ACM 26 (8): 562-569.
-
(1983)
Communications of the ACM
, vol.26
, Issue.8
, pp. 562-569
-
-
Hansen James, V.1
-
57
-
-
0041291986
-
-
RFC 3280, April
-
Housley, Russell, Tim Polk, Warwick Ford, and David Solo. 2002. Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 3280, April. www.ietf.org/rfc/rfc3280.txt.
-
(2002)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
-
Housley, R.1
Polk, T.2
Ford, W.3
Solo, D.4
-
60
-
-
84914715638
-
Audit trail organization in relational databases
-
Jajodia, Sushil, Shashi K. Gadia, Gautam Bhargava, and Edgar H. Sibley. 1989. Audit trail organization in relational databases. DBSec 1989: 269-281.
-
(1989)
DBSec
, vol.1989
, pp. 269-281
-
-
Jajodia, S.1
Gadia, S.K.2
Bhargava, G.3
Sibley, E.H.4
-
64
-
-
84957640277
-
Failsafe key escrow
-
Santa Barbara, California, USA, August 1995, Proceedings (LNCS 963), ed. Don Coppersmith Berlin: Springer-Verlag
-
Kilian, Joseph, and Tom Leighton. 1995. Failsafe key escrow. In Advances in Cryptology - CRYPTO '95:15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 1995, Proceedings (LNCS 963), ed. Don Coppersmith, 208-221. Berlin: Springer-Verlag.
-
(1995)
Advances in Cryptology - CRYPTO '95:15Th Annual International Cryptology Conference
, pp. 208-221
-
-
Kilian, J.1
Leighton, T.2
-
65
-
-
84947924770
-
The difficulty of software key escrow
-
Saragossa, Spain, May 12-16, 1996, Proceedings (LNCS 1070), ed. Ueli Maurer Berlin: Springer-Verlag
-
Knudsen, Lars R., and Torben P. Pedersen. 1996. The difficulty of software key escrow. In Advances in Cryptology - EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceedings (LNCS 1070), ed. Ueli Maurer, 237-244. Berlin: Springer-Verlag.
-
(1996)
Advances in Cryptology - EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques
, pp. 237-244
-
-
Knudsen Lars, R.1
Pedersen, T.P.2
-
66
-
-
84958063551
-
On certificate revocation and validation
-
Anguilla, British West Indies, February 1998, Proceedings (LNCS 1465), ed. Rafael Hirschfeld Berlin: Springer-Verlag
-
Kocher, Paul. 1998. On certificate revocation and validation. In Financial Cryptography: Second International Conference, FC '98, Anguilla, British West Indies, February 1998, Proceedings (LNCS 1465), ed. Rafael Hirschfeld, 172-177. Berlin: Springer-Verlag.
-
(1998)
Financial Cryptography: Second International Conference, FC '98
, pp. 172-177
-
-
Paul, K.1
-
67
-
-
84889968906
-
Temporal firewalls
-
Presented at Schloss Reisensburg, Germany
-
Kopetz, Hermann. 1996. Temporal firewalls. Presented at DeVa 1st Selective Open Workshop, Schloss Reisensburg, Germany.
-
(1996)
DeVa 1st Selective Open Workshop
-
-
Kopetz, H.1
-
71
-
-
0020780905
-
The weak byzantine generals problem
-
Lamport, Leslie. 1983. The weak Byzantine generals problem. Journal of the ACM 30 (3): 668-676.
-
(1983)
Journal of the ACM
, vol.30
, Issue.3
, pp. 668-676
-
-
Lamport, L.1
-
73
-
-
84976699318
-
The byzantine generals problem
-
Lamport, Leslie, Robert Shostak, and Marshall Pease. 1982. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems 4 (3), 382-401.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
74
-
-
0003613453
-
-
W3C recommendation, November 13
-
Le Hors, Arnaud, Philippe Le Hégaret, Lauren Wood, Gavin Nicol, Jonathan Robie, Mike Champion, and Steve Byrne. 2000. Document Object Model (DOM) level 2 core specification. W3C recommendation, November 13. www.w3.org/TR/DOM-Level-2-Core.
-
(2000)
Document Object Model (DOM) Level 2 Core Specification
-
-
Le Hors, A.1
Le Hégaret, P.2
Wood, L.3
Nicol, G.4
Robie, J.5
Champion, M.6
Byrne, S.7
-
77
-
-
85141038051
-
Mining audit data to build intrusion detection models
-
ed. Usama M. Fayyad and Ramasamy Uthurusamy Menlo Park, CA: AAAI Press
-
Lee, Wenke, Salvatore J. Stolfo, and Kui W Mok. 1998. Mining audit data to build intrusion detection models. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining, ed. Usama M. Fayyad and Ramasamy Uthurusamy, 66-72. Menlo Park, CA: AAAI Press.
-
(1998)
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining
, pp. 66-72
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
78
-
-
0034455983
-
Adaptive intrusion detection: A data mining approach
-
-. 2000. Adaptive intrusion detection: A data mining approach. Artificial Intelligence Review 14 (6): 533-567.
-
(2000)
Artificial Intelligence Review
, vol.14
, Issue.6
, pp. 533-567
-
-
Lee, W.1
-
81
-
-
84947439162
-
A key escrow system with warrant bounds
-
Santa Barbara, California, USA, August 1995, Proceedings (LNCS 963), ed. Don Coppersmith Berlin: Springer-Verlag
-
Lenstra, Arjen K., Peter Winkler, and Yacov Yacobi. 1995. A key escrow system with warrant bounds. In Advances in Cryptology - CRYPTO '95:15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 1995, Proceedings (LNCS 963), ed. Don Coppersmith, 197-207. Berlin: Springer-Verlag.
-
(1995)
Advances in Cryptology - CRYPTO '95:15Th Annual International Cryptology Conference
, pp. 197-207
-
-
Lenstra Arjen, K.1
Winkler, P.2
Yacobi, Y.3
-
84
-
-
0027609384
-
A survey of intrusion detection techniques
-
-. 1993. A survey of intrusion detection techniques. Computers and Security 12 (4): 405-418.
-
(1993)
Computers and Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt Teresa, F.1
-
86
-
-
84889982641
-
-
Imperva, September
-
Maor, Ofer, and Amichai Shulman. 2003. Blind SQL injection. Imperva, September. www.imperva.com/application-defense-center/white-papers/blind-sql- server-injection.html.
-
(2003)
Blind SQL Injection
-
-
Ofer, M.1
Shulman, A.2
-
87
-
-
84959047912
-
A multi-party optimistic non-repudiation protocol
-
Seoul, Korea, December 8-9, 2000, Proceedings (LNCS 2015), ed. Dongho Won Berlin: Springer-Verlag
-
Markowitch, Olivier, and Steve Kremer. 2001. A multi-party optimistic non-repudiation protocol. In Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (LNCS 2015), ed. Dongho Won, 109-122. Berlin: Springer-Verlag.
-
(2001)
Information Security and Cryptology - ICISC 2000, Third International Conference
, pp. 109-122
-
-
Markowitch, O.1
Kremer, S.2
-
90
-
-
0033885757
-
Windowed certificate revocation
-
McDaniel, Patrick, and Sugih Jamin. 2000. Windowed certificate revocation. INFOCOM (3), 1406-1414.
-
(2000)
INFOCOM
, Issue.3
, pp. 1406-1414
-
-
McDaniel, P.1
Jamin, S.2
-
92
-
-
84889962544
-
Make your software behave: Learning the basics of buffer overflows
-
March 1
-
McGraw, Gary, and John Viega. 2000. Make your software behave: Learning the basics of buffer overflows. IBM developerWorks, March 1.
-
(2000)
IBM DeveloperWorks
-
-
McGraw, G.1
Viega, J.2
-
93
-
-
84969346266
-
A certified digital signature
-
Santa Barbara, California, USA, August 20-24, 1989, Proceedings (LNCS 435), ed. Gilles Brassard Berlin: Springer-Verlag
-
Merkle, Ralph C. 1990. A certified digital signature. In Advances in Cryptology - CRYPTO '89:9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings (LNCS 435), ed. Gilles Brassard, 218-238. Berlin: Springer-Verlag.
-
(1990)
Advances in Cryptology - CRYPTO '89:9Th Annual International Cryptology Conference
, pp. 218-238
-
-
Merkle Ralph, C.1
-
97
-
-
0002825551
-
Digital signatures
-
ed. Gustavus J. Simmons Piscataway, NJ: WileyIEEE Press
-
Mitchell, C. J., F. Piper, and P. Wild. 1992. Digital signatures. In Contemporary Cryptology: The Science of Information Integrity, ed. Gustavus J. Simmons, 325-378. Piscataway, NJ: WileyIEEE Press.
-
(1992)
Contemporary Cryptology: The Science of Information Integrity
, pp. 325-378
-
-
Mitchell, C.J.1
Piper, F.2
Wild, P.3
-
98
-
-
0003757663
-
-
Internet standard RFC 1034 (updated by RFCs 1101, 1183, 1348, 1876, 1982, 2065, 2181, 2308, 2535, 4033, 4034, 4035, 4343, and 4035), November
-
Mockapetris, P.V 1987. Domain names - concepts and facilities. Internet standard RFC 1034 (updated by RFCs 1101, 1183, 1348, 1876, 1982, 2065, 2181, 2308, 2535, 4033, 4034, 4035, 4343, and 4035), November. www.ietf.org/rfc/ rfc1034.txt.
-
(1987)
Domain Names - Concepts and Facilities
-
-
Mockapetris, P.V.1
-
101
-
-
0742276097
-
Inside the slammer worm
-
Moore, David, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver. 2003. Inside the Slammer worm. IEEE Security & Privacy 1 (4): 33-39.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
103
-
-
0018543411
-
Password security: A case history
-
Morris, Robert, and Ken Thompson. 1979. Password security: A case history. Communications of the ACM 22 (11): 594-597.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
106
-
-
4244131492
-
Auditing issues in secure database management systems
-
National Computer Security Center May
-
National Computer Security Center. 1996. Auditing issues in secure database management systems. National Computer Security Center Technical Report - 005, vol. 4/5, May.
-
(1996)
National Computer Security Center Technical Report - 005
, vol.4-5
-
-
-
107
-
-
0030270929
-
A public-key-based key escrow system
-
Nechvatal, James. 1996. A public-key-based key escrow system. Journal of Systems and Software 35 (1): 73-83.
-
(1996)
Journal of Systems and Software
, vol.35
, Issue.1
, pp. 73-83
-
-
Nechvatal, J.1
-
109
-
-
0031140709
-
Internet security: Firewalls and beyond
-
Oppliger, Rolf. 1997. Internet security: Firewalls and beyond. Communications of the ACM 40 (5): 92-102.
-
(1997)
Communications of the ACM
, vol.40
, Issue.5
, pp. 92-102
-
-
Rolf, O.1
-
110
-
-
26444620896
-
A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher
-
(LNCS 3017) Berlin: Springer-Verlag
-
Paul, Souradyuti, and Bart Preneel. 2004. A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi, India, February 2004, revised papers (LNCS 3017), 245-259. Berlin: Springer-Verlag.
-
(2004)
Fast Software Encryption: 11Th International Workshop, FSE 2004, Delhi, India, February 2004, Revised Papers
, pp. 245-259
-
-
Paul, S.1
Preneel, B.2
-
112
-
-
0023207670
-
The design of an effective auditing subsystem
-
Oakland, CA: IEEE Computer Society Press
-
Picciotto, Jeffery. 1987. The design of an effective auditing subsystem. In IEEE Symposium on Security and Privacy, 13-22. Oakland, CA: IEEE Computer Society Press.
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 13-22
-
-
Picciotto, J.1
-
115
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
January
-
Ptacek, Thomas H., and Timothy N. Newsham. 1998. Insertion, evasion, and denial of service: Eluding network intrusion detection. Secure Networks, Technical Report, January.
-
(1998)
Secure Networks, Technical Report
-
-
Ptacek Thomas, H.1
Newsham, T.N.2
-
116
-
-
0347802687
-
Digital signatures
-
ed. Richard DeMillo, David Dobkin, Anita Jones, and Richard Lipton New York: Academic Press
-
Rabin, Michael O. 1978. Digital signatures. In Foundations of Secure Computation, ed. Richard DeMillo, David Dobkin, Anita Jones, and Richard Lipton, 155-168. New York: Academic Press.
-
(1978)
Foundations of Secure Computation
, pp. 155-168
-
-
Rabin Michael, O.1
-
117
-
-
0003614758
-
Digitalized signatures and public-key functions as intractable as factorization
-
-. 1979. Digitalized signatures and public-key functions as intractable as factorization. MIT Technical Report, MIT/LCS/TR-212.
-
(1979)
MIT Technical Report, MIT/LCS/TR-212
-
-
Rabin Michael, O.1
-
120
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., A. Shamir, and L. Adelman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM21 (2): 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.3
-
124
-
-
0005276660
-
Tamperproof audit logs as a forensics tool for intrusion detection systems
-
Schneier, Bruce, and John Kelsey. 1999. Tamperproof audit logs as a forensics tool for intrusion detection systems. Computer Networks and ISDN Systems.
-
(1999)
Computer Networks and ISDN Systems
-
-
Schneier, B.1
Kelsey, J.2
-
125
-
-
84890006151
-
Auditing large scale data bases
-
Scott, George M. 1977. Auditing large scale data bases. VLDB, 515-522.
-
(1977)
VLDB
, pp. 515-522
-
-
Scott George, M.1
-
127
-
-
0033280865
-
A high-performance network intrusion detection system
-
New York: ACM Press
-
Sekar, R., Y. Guang, S. Verma, and T. Shanbhag. 1999. A high-performance network intrusion detection system. In Proceedings of the 6th ACM Conference on Computer and Communications Security, 8-17. New York: ACM Press.
-
(1999)
Proceedings of the 6th ACM Conference on Computer and Communications Security
, pp. 8-17
-
-
Sekar, R.1
Guang, Y.2
Verma, S.3
Shanbhag, T.4
-
128
-
-
84889983090
-
Partial key escrow: A new approach to software key escrow
-
Presented at Washington, DC
-
Shamir, Adi. 1995. Partial key escrow: A new approach to software key escrow. Presented at Key Escrow Conference, Washington, DC.
-
(1995)
Key Escrow Conference
-
-
Adi, S.1
-
129
-
-
4344627335
-
The spread of the witty worm
-
Shannon, Colleen, and David Moore. 2004. The spread of the Witty worm. IEEE Security & Privacy 2 (4): 46-50.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
131
-
-
84889855627
-
-
Spett, Kevin. 2005. Blind SQL injection. SPI Dynamics, www.spidynamics.com/whitepapers/Blind-SQLInjection.pdf.
-
(2005)
Blind SQL Injection
-
-
Spett, K.1
-
132
-
-
84889956484
-
Using the fluhrer, mantin, and shamir attack to break WEP
-
Stubblefield, Adam, John Ioannidis, and Aviel D. Rubin. 2002. Using the Fluhrer, Mantin, and Shamir attack to break WEP. In Network and Distributed Systems Security Symposium (NDSS).
-
(2002)
Network and Distributed Systems Security Symposium (NDSS)
-
-
Adam, S.1
Ioannidis, J.2
Rubin, A.D.3
-
134
-
-
84947942913
-
-
Wollongong, NSW, Australia, June 24-26, 1996, Proceedings (LNCS 1172), ed. Josef Pieprzyk and Jennifer Seberry Berlin: Springer-Verlag
-
Taylor, R. 1996. Non-repudiation without public-key In Information Security and Privacy: First Australasian Conference on Information Security and Privacy, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings (LNCS 1172), ed. Josef Pieprzyk and Jennifer Seberry, 27-37. Berlin: Springer-Verlag.
-
(1996)
Non-repudiation Without Public-key in Information Security and Privacy: First Australasian Conference on Information Security and Privacy
, pp. 27-37
-
-
Taylor, R.1
-
135
-
-
58049152987
-
Impact of software vulnerability announcements on the market value of software vendors: An empirical investigation
-
Kennedy School of Government, Harvard University
-
Telang, Rahul, and Sunil Wattal. 2005. Impact of software vulnerability announcements on the market value of software vendors: An empirical investigation. In Fourth Workshop on the Economics of Information Security, Kennedy School of Government, Harvard University.
-
(2005)
Fourth Workshop on the Economics of Information Security
-
-
Telang, R.1
Wattal, S.2
-
138
-
-
1542509452
-
Commercial key escrow: Something for everyone now and for the future
-
January
-
Walker, Stephen T, Steven B. Lipner, Carl M. Ellison, Dennis K. Branstad, and David M. Balenson. 1995. Commercial key escrow: Something for everyone now and for the future. Trusted Information Systems, TIS report 541, January.
-
(1995)
Trusted Information Systems, TIS Report 541
-
-
Walker Stephen, T.1
Lipner, S.B.2
Ellison, C.M.3
Branstad, D.K.4
Balenson, D.M.5
-
139
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Santa Barbara, California, USA, August 2005, Proceedings (LNCS 3621) Berlin: Springer-Verlag
-
Wang, Xiaoyun, Yiqun Lisa Yin, and Hongbu Yu. 2005. Finding collisions in the full SHA-1. In Advances in Cryptology - CRYPTO 2005:25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 2005, Proceedings (LNCS 3621), 17-36. Berlin: Springer-Verlag.
-
(2005)
Advances in Cryptology - CRYPTO 2005:25Th Annual International Cryptology Conference
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
140
-
-
0029756282
-
Cooperating security managers: Apeer-based intrusion detection system
-
White, Gregory B., Eric A Fisch, and Udo W Pooch. 1996. Cooperating security managers: Apeer-based intrusion detection system. IEEE Network 10 (1): 20-23.
-
(1996)
IEEE Network
, vol.10
, Issue.1
, pp. 20-23
-
-
White Gregory, B.1
Fisch, E.A.2
Pooch, U.W.3
-
147
-
-
84955602209
-
Observations on non-repudiation
-
Kyongju, Korea, November 1996, Proceedings (LNCS 1163), ed. Kwangjo Kim and Tsutomu Matsumoto Berlin: Springer-Verlag
-
-. 1996b. Observations on non-repudiation. In Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 1996, Proceedings (LNCS 1163), ed. Kwangjo Kim and Tsutomu Matsumoto, 133-144. Berlin: Springer-Verlag.
-
(1996)
Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security
, pp. 133-144
-
-
Zhou, J.1
-
150
-
-
0039311188
-
Towards verification of non-repudiation protocols
-
edited by Jim Grundy, Mart. In Schwenke, and Trevor Vickers Berlin: Springer-Verlag
-
-. 1998. Towards verification of non-repudiation protocols. In International Refinement Workshop and Formal Methods Pacific '98, edited by Jim Grundy, Mart. In Schwenke, and Trevor Vickers, 370-380. Berlin: Springer-Verlag.
-
(1998)
International Refinement Workshop and Formal Methods Pacific '98
, pp. 370-380
-
-
Zhou, J.1
|