-
2
-
-
84949833589
-
-
Report of TAB Workshop on Security in the Internet Architecture. RFC 1636, June, Network Working Group
-
R. Braden, D. Clark, S. Crocker, and C. Huitema. Report of TAB Workshop on Security in the Internet Architecture. RFC 1636, June 1994. Network Working Group.
-
(1994)
-
-
Braden, R.1
Clark, D.2
Crocker, S.3
Huitema, C.4
-
4
-
-
0000874415
-
Limitations of the Kerberos Authentication System
-
October
-
S.M. Bellovin and M. Merritt. Limitations of the Kerberos Authentication System. Computer Communication Review, 20(5):119-132, October 1990.
-
(1990)
Computer Communication Review
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
84949833590
-
-
CDPD Forum, Release 1.1, January
-
Cellular Digital Packet Data System Specification. CDPD Forum, Release 1.1, January 1995.
-
(1995)
-
-
-
8
-
-
0023294428
-
An Intrusion-Detection Model
-
February
-
Dorothy Denning. An Intrusion-Detection Model. IEEE Transactions on Software Engineering, SE-13(2):222-232,February 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
11
-
-
84949833592
-
-
Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2). RFC 1446May, Network Working Group
-
J. GaJvin and K. McCloghrie. Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2). RFC 1446, May 1993. Network Working Group.
-
(1993)
-
-
Gajvin, J.1
McCloghrie, K.2
-
12
-
-
3643099372
-
The Architecture and Implementation of Network-Layer Security Under Unix
-
October
-
John Ioannidis and Matt Blaze. The Architecture and Implementation of Network-Layer Security Under Unix. In 4th Usenix Security Symposium, October 1993.
-
(1993)
4Th Usenix Security Symposium
-
-
Ioannidis, J.1
Blaze, M.2
-
14
-
-
84949833595
-
-
H0tJava(tm): The Security Story. Java home page
-
Sun Microsystems. H0tJava(tm): The Security Story. Java home page.
-
-
-
-
16
-
-
84949833597
-
-
Technical Report TR-95-15, CS Department, University of Arizona, Tucson, AZ, January
-
Hilarie Orman. Evolving an Implementation of a Network Level Security. Technical Report TR-95-15, CS Department, University of Arizona, Tucson, AZ, January 1996.
-
(1996)
Evolving an Implementation of a Network Level Security
-
-
Orman, H.1
-
17
-
-
84949833598
-
-
IP Mobility Support, draft 15. Internet Draft, IETF, Mobile IP Working Group
-
Charles Perkins. IP Mobility Support, draft 15. Internet Draft, IETF, February 1996. Mobile IP Working Group.
-
(1996)
-
-
Perkins, C.1
-
18
-
-
0002473030
-
DIDS (Distributed Intrusion Detection System) - Motivation,Architecture, and an Early Prototype
-
et. al. Steven R. Snapp. DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and an Early Prototype. In 14th National Computer Security Conference, pages 167-176, October 1991.
-
(1991)
14Th National Computer Security Conference,
, pp. 167-176
-
-
Snapp, S.R.1
-
19
-
-
1542313506
-
Performance Analysis of MDS
-
Cambridge, MA, September
-
Joseph Touch. Performance Analysis of MDS. In SIGCOMM: Communication Architectures, Protocols and Applications, pages 77-86, Cambridge, MA, September 1995
-
(1995)
SIGCOMM: Communication Architectures, Protocols and Applications
, pp. 77-86
-
-
Touch, J.1
-
21
-
-
84949833600
-
-
Technical Report TR-96-05, Computer Science Department, North Carohna State University, June, submitted
-
S. F. Wu, M.S. Davis, J. Hansoty, J. Yuill, J. Webster, and X. Hu. LAVA Secure Delegation for Mobile Applets. Technical Report TR-96-05, Computer Science Department, North Carohna State University, June 1996. submitted.
-
(1996)
LAVA Secure Delegation for Mobile Applets
-
-
Wu, S.F.1
Davis, M.S.2
Hansoty, J.3
Yuill, J.4
Webster, J.5
Hu, X.6
-
22
-
-
84949833601
-
EMOSY: An SNMP Protocol Object Generator for the PIMIB
-
Los Angeles, CA, April
-
Shyhtsun F. Wu, Subrata Mazumdar, and Stephen Brady. EMOSY: An SNMP Protocol Object Generator for the PIMIB. In IEEE First International Workshop on System Management, Los Angeles, CA, April 1993.
-
(1993)
IEEE First International Workshop on System Management
-
-
Shyhtsun, F.W.1
Mazumdar, S.2
Stephen, B.3
-
23
-
-
84949743023
-
On Implementing a Protocol Independent MIB
-
Plenum Press, New York
-
Shyhtsun F. Wu, Subrata Mazumdar, Stephen Brady, and David Levine. On Implementing a Protocol Independent MIB. In Network Management and Control, volume 2, pages 309-329. Plenum Press, New York, 1994.
-
(1994)
Network Management and Control
, vol.2
, pp. 309-329
-
-
Shyhtsun, F.W.1
Mazumdar, S.2
Brady, S.3
Levine, D.4
-
24
-
-
84949833602
-
-
PhD thesis, Columbia University,Computer Science Department, New York, NY, July
-
Shyhtsun F. Wu. ε-Consistent Real- Time Monitoring]or Rapidly Changing Data. PhD thesis, Columbia University, Computer Science Department, New York, NY, July 1995.
-
(1995)
ε-Consistent Real- Time Monitoring]Or Rapidly Changing Data.
-
-
Shyhtsun, F.W.1
-
25
-
-
2442608984
-
Security versus Performance Requirements in Data Communication Systems
-
Brighton, UK, November
-
Vasilios Zorkadis. Security versus Performance Requirements in Data Communication Systems. In Computer Security- ESORICS 94, pages 19-30, Brighton, UK, November 1994.
-
(1994)
Computer Security- ESORICS 94
, pp. 19-30
-
-
Zorkadis, V.1
|