-
1
-
-
0009060610
-
Packets found on an internet
-
July
-
Steven M. Bellovin. Packets found on an internet. Computer Communications Review, 23(3):26-31, July 1993.
-
(1993)
Computer Communications Review
, vol.23
, Issue.3
, pp. 26-31
-
-
Bellovin, S.M.1
-
4
-
-
85077758112
-
Passive analysis of SSH (secure shell) traffic
-
March
-
Solar Designer and Dug Song. Passive analysis of SSH (secure shell) traffic. Openwall advisory OW-003, March 2001.
-
(2001)
Openwall Advisory OW-003
-
-
Designer, S.1
Song, D.2
-
7
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
February
-
Rick Joyce and Gopal Gupta. Identity authentication based on keystroke latencies. Communications of the ACM, 33(2):168-176, February 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
8
-
-
0003062448
-
Cryptanalysis of diffie-hellman, RSA, DSS, and other cryptosystems using timing attacks
-
Springer-Verlag
-
P. Kocher. Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks. In Advances in cryptology, CRYPTO '95, pages 171-183. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology, CRYPTO '95
, pp. 171-183
-
-
Kocher, P.1
-
13
-
-
85077748212
-
-
National Bureau of Standards Federal Information Processing Standards Publication 46 (FIPS PUB 46), January
-
National Bureau of Standards. Specification for the Data Encryption Standard. Federal Information Processing Standards Publication 46 (FIPS PUB 46), January 1977.
-
(1977)
Specification for the Data Encryption Standard
-
-
-
14
-
-
0003508568
-
-
Draft Federal Information Processing Standards Publication 46-3 (FIPS PUB 46-3), January
-
U. S. National Institute of Standards and Technology (NIST). Data Encryption Standard (DES). Draft Federal Information Processing Standards Publication 46-3 (FIPS PUB 46-3), January 1999.
-
(1999)
Data Encryption Standard (DES)
-
-
-
15
-
-
0032021402
-
Computer user verification using login string keystroke dynamics
-
J. A. Robinson, V. M. Liang, J. A. Chambers, and C. L. MacKenzie. Computer user verification using login string keystroke dynamics. IEEE Transactions on System, Man, and Cybernetics, 28(2), 1998.
-
(1998)
IEEE Transactions on System, Man, and Cybernetics
, vol.28
, Issue.2
-
-
Robinson, J.A.1
Liang, V.M.2
Chambers, J.A.3
MacKenzie, C.L.4
-
17
-
-
0001895261
-
Prediction and entropy of printed english
-
Claude E. Shannon. Prediction and Entropy of Printed English. Bell Sys. Tech. J (3), 1950.
-
(1950)
Bell Sys. Tech. J
, Issue.3
-
-
Shannon, C.E.1
-
21
-
-
85077760117
-
SSH authentication protocol
-
May Work in progress
-
T. Ylönen, T. Kivinen, M. Saarinen, T. Rinne, and S. Lehtinen. SSH authentication protocol. Internet Draft, Internet Engineering Task Force, May 2000. Work in progress.
-
(2000)
Internet Draft, Internet Engineering Task Force
-
-
Ylönen, T.1
Kivinen, T.2
Saarinen, M.3
Rinne, T.4
Lehtinen, S.5
-
22
-
-
85077745786
-
SSH protocol architecture
-
May Work in progress
-
T. Ylönen, T. Kivinen, M. Saarinen, T. Rinne, and S. Lehtinen. SSH protocol architecture. Internet Draft, Internet Engineering Task Force, May 2000. Work in progress.
-
(2000)
Internet Draft, Internet Engineering Task Force
-
-
Ylönen, T.1
Kivinen, T.2
Saarinen, M.3
Rinne, T.4
Lehtinen, S.5
-
23
-
-
85084164692
-
SSH - Secure login connections over the internet
-
San Jose, California, July
-
Tatu Ylönen. SSH - Secure Login Connections over the Internet. In Sixth USENIX Security Symposium, San Jose, California, July 1996.
-
(1996)
Sixth USENIX Security Symposium
-
-
Ylönen, T.1
|