Sciweavers

COMPCON
1996
IEEE
14 years 3 months ago
Broadband Algorithms with the MicroUnity MediaProcessor
An important objective of the MicroUnity mediaprocessor is to allow the design of systems that replace hardwired functionality with software. One of the key design techniques that...
Curtis Abbott, Henry Massalin, Kevin Peterson, Tom...
NDSS
1997
IEEE
14 years 3 months ago
Securing Distance-Vector Routing Protocols
Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-...
NDSS
1997
IEEE
14 years 3 months ago
Securing the Nimrod Routing Architecture
Karen E. Sirois, Stephen T. Kent
NDSS
1997
IEEE
14 years 3 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
NDSS
1997
IEEE
14 years 3 months ago
Experimental Results of Covert Channel Limitation in One-Way Communication Systems
Nick Ogurtsov, Hilarie K. Orman, Richard Schroeppe...
NDSS
1997
IEEE
14 years 3 months ago
Blocking Java Applets at the Firewall
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementat...
David M. Martin Jr., Sivaramakrishnan Rajagopalan,...
NDSS
1997
IEEE
14 years 3 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
NDSS
1997
IEEE
14 years 3 months ago
Securing Web Access with DCE
Brian C. Schimpf
NDSS
1997
IEEE
14 years 3 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...
LCN
1997
IEEE
14 years 3 months ago
The Optimal Virtual Path Design of ATM Networks
This paper studies the optimal configuration of virtual paths in ATM networks. A linear model that minimizes the mrximumjow density of links is proposed for the optimal virtual pa...
Zhigang Qin, Tetiana Lo, Felix F. Wu