Sciweavers

16 search results - page 2 / 4
» ndss 1998
Sort
View
NDSS
1998
IEEE
13 years 9 months ago
Automated Recovery in a Secure Bootstrap Process
William A. Arbaugh, Angelos D. Keromytis, David J....
NDSS
1998
IEEE
13 years 9 months ago
Attack Detection Methods for All-Optical Networks
This paper focuses on theoretical methods for detecting intentional attacks upon the infrastructure of an all-optical network. Applications of existing methods used in traditional...
Muriel Médard, Douglas Marquis, Stephen R. ...
NDSS
1998
IEEE
13 years 9 months ago
The Multilayer Firewall
We present a new security technology called the Multilayer Firewall. We argue that it is useful in some situations for which other approaches, such as cryptographically protected ...
Dan M. Nessett, Polar Humenn
NDSS
1998
IEEE
13 years 9 months ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just
NDSS
1998
IEEE
13 years 9 months ago
Credential Management and Secure Single Login for SPKM
The GSS-API [20, 21] offers security services independent of underlying mechanisms. A possible GSS-mechanism is the Simple Public Key Mechanism (SPKM) specified in [1]. In this pa...
Detlef Hühnlein