LISA   2008
Wall of Fame | Most Viewed LISA-2008 Paper
13 years 6 months ago
Authentication on Untrusted Remote Hosts with Public-Key Sudo
Two common tools in Linux- and UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substant...
Matthew Burnside, Mack Lu, Angelos D. Keromytis
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source183
2Download preprint from source174
3Download preprint from source159
4Download preprint from source143
5Download preprint from source140
6Download preprint from source140
7Download preprint from source140
8Download preprint from source139
9Download preprint from source138
10Download preprint from source138
11Download preprint from source138
12Download preprint from source137
13Download preprint from source114
14Download preprint from source110
15Download preprint from source96