This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
In this paper we present 411, a password distribution system for high performance environments that provides security and scalability. We show that existing solutions such as NIS ...
Federico D. Sacerdoti, Mason J. Katz, Philip M. Pa...
Patching, upgrading, and maintaining operating system software is a growing management complexity problem that can result in unacceptable system downtime. We introduce AutoPod, a ...
In this paper, we propose an IPSec implementation on Xilinx Virtex-II Pro FPGA1 . We move the key management and negotiation into software function calls that run on the PowerPC p...