Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
NDSS
1999
IEEE
12 years 1 months ago
PGRIP: PNNI Global Routing Infrastructure Protection
We describe a system for achieving PNNI (Private Network-Network Interface) Global Routing Infrastructure Protection (PGRIP). We give details of PGRIP's system-level design a...
Sabrina De Capitani di Vimercati, Patrick Lincoln,...
NDSS
1999
IEEE
12 years 1 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman
NDSS
1999
IEEE
12 years 1 months ago
Secure Remote Access to an Internal Web Server
We address the problem of secure remote access to a site's internal web server from outside the rewall. The goal is to give authorized users access to sensitive information, ...
Christian Gilmore, David P. Kormann, Aviel D. Rubi...
NDSS
1999
IEEE
12 years 1 months ago
Distributed Policy Management for JDK 1.2
Pekka Nikander, Jonna Partanen
NDSS
1999
IEEE
12 years 1 months ago
Experimenting with Shared Generation of RSA Keys
We describe an implementation of a distributed algorithm to generate a shared RSA key. At the end of the computation, an RSA modulus N = pq is publicly known. All servers involved...
Michael Malkin, Thomas D. Wu, Dan Boneh
NDSS
1999
IEEE
12 years 1 months ago
A Real-World Analysis of Kerberos Password Security
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it has been known for quite some time that Kerberos i...
Thomas D. Wu
NDSS
1999
IEEE
12 years 1 months ago
Transport-Friendly ESP
Steven M. Bellovin
NDSS
1999
IEEE
12 years 1 months ago
Why Do We Need More Research?
Steven M. Bellovin
NDSS
1999
IEEE
12 years 1 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
books