Sciweavers

NDSS
1997
IEEE
14 years 4 months ago
Securing Distance-Vector Routing Protocols
Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-...
NDSS
1997
IEEE
14 years 4 months ago
Securing the Nimrod Routing Architecture
Karen E. Sirois, Stephen T. Kent
NDSS
1997
IEEE
14 years 4 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
NDSS
1997
IEEE
14 years 4 months ago
Experimental Results of Covert Channel Limitation in One-Way Communication Systems
Nick Ogurtsov, Hilarie K. Orman, Richard Schroeppe...
NDSS
1997
IEEE
14 years 4 months ago
Blocking Java Applets at the Firewall
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementat...
David M. Martin Jr., Sivaramakrishnan Rajagopalan,...
NDSS
1997
IEEE
14 years 4 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
NDSS
1997
IEEE
14 years 4 months ago
Securing Web Access with DCE
Brian C. Schimpf
NDSS
1997
IEEE
14 years 4 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...