-
1
-
-
21144445180
-
Flexible and scalable public key security for SSH
-
Y. Ali and S. Smith. Flexible and scalable public key security for SSH. In EuroPKI, pages 43–56, 2004.
-
(2004)
EuroPKI
, pp. 43-56
-
-
Ali, Y.1
Smith, S.2
-
2
-
-
26444545299
-
Experience with an evolving overlay network testbed
-
July
-
D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris. Experience with an Evolving Overlay Network Testbed. ACM Computer Communications Review, 33(3):13–19, July 2003.
-
(2003)
ACM Computer Communications Review
, vol.33
, Issue.3
, pp. 13-19
-
-
Andersen, D.G.1
Balakrishnan, H.2
Kaashoek, M.F.3
Morris, R.4
-
4
-
-
0343701135
-
-
Internet Engineering Task Force, Nov. RFC 4880
-
J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer. OpenPGP Message Format. Internet Engineering Task Force, Nov. 2007. RFC 4880.
-
(2007)
OpenPGP Message Format
-
-
Callas, J.1
Donnerhacke, L.2
Finney, H.3
Shaw, D.4
Thayer, R.5
-
7
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, pages 107–125, 1992.
-
(1992)
Designs, Codes and Cryptography
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
12
-
-
85076603762
-
(R)Evolutionary bootstrapping of a global PKI for securing BGP
-
Nov
-
Y.-C. Hu, D. McGrew, A. Perrig, B. Weis, and D. Wendlandt. (R)Evolutionary bootstrapping of a global PKI for securing BGP. In Proc. 5th ACM Workshop on Hot Topics in Networks (Hotnets-V), Nov. 2006.
-
(2006)
Proc. 5th ACM Workshop on Hot Topics in Networks (Hotnets-V)
-
-
Hu, Y.-C.1
McGrew, D.2
Perrig, A.3
Weis, B.4
Wendlandt, D.5
-
14
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. Lenstra and E. Verheul. Selecting cryptographic key sizes. Journal of Cryptology, 14(4):255–293, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.1
Verheul, E.2
-
15
-
-
0003700417
-
-
Technical report, MIT, Oct. Project Athena Technical Plan
-
S. Miller, B. Neuman, J. Schiller, and J. Saltzer. Kerberos authentication and authorization system. Technical report, MIT, Oct. 1988. Project Athena Technical Plan.
-
(1988)
Kerberos Authentication and Authorization System
-
-
Miller, S.1
Neuman, B.2
Schiller, J.3
Saltzer, J.4
-
17
-
-
85077199573
-
-
OpenSSH. http://www.openssh.com
-
OpenSSH. http://www.openssh.com.
-
-
-
-
24
-
-
84857297231
-
-
Tor Exit Node Hijacks
-
Tor Exit Node Hijacks. TOR exit-node doing MITM attacks. http://www.teamfurry.com/wordpress/2007/11/20/tor-exit-node-doing-mitm-attacks.
-
TOR Exit-Node Doing MITM Attacks
-
-
-
25
-
-
85077218883
-
-
Traceroute.org. Traceroute.org. http://www.traceroute. org
-
Traceroute.org. Traceroute.org. http://www.traceroute. org.
-
-
-
-
26
-
-
77950880459
-
-
W32.Arpiframe
-
W32.Arpiframe. W32.arpiframe. http://http://www. symantec.com/business/security_response/ writeup.jsp?docid=2007- 061222- 0609- 99.
-
W32.Arpiframe
-
-
|