Sciweavers

986 search results - page 147 / 198
» Protecting the Intranet Against
Sort
View
WCRE
1999
IEEE
14 years 7 days ago
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a...
Timothy S. Souder, Spiros Mancoridis
NDSS
1998
IEEE
14 years 6 days ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
IH
1998
Springer
14 years 6 days ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
ICC
1997
IEEE
133views Communications» more  ICC 1997»
14 years 5 days ago
MESH: Distributed Error Recovery for Multimedia Streams in Wide-Area Multicast Networks
This paper addresses support for nzulti-party multimedia applications delivered across datagram wide-area networks such as the Internet. Our approach is to develop a novel retrans...
Matthew T. Lucas, Bert J. Dempsey, Alfred C. Weave...
CCS
1994
ACM
14 years 2 days ago
Protocol Failure in the Escrowed Encryption Standard
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Matt Blaze