Sciweavers

NDSS
1997
IEEE
13 years 11 months ago
Securing Distance-Vector Routing Protocols
Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-...
NDSS
1997
IEEE
13 years 11 months ago
Securing the Nimrod Routing Architecture
Karen E. Sirois, Stephen T. Kent
NDSS
1997
IEEE
13 years 11 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
NDSS
1997
IEEE
13 years 11 months ago
Experimental Results of Covert Channel Limitation in One-Way Communication Systems
Nick Ogurtsov, Hilarie K. Orman, Richard Schroeppe...
NDSS
1997
IEEE
13 years 11 months ago
Blocking Java Applets at the Firewall
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementat...
David M. Martin Jr., Sivaramakrishnan Rajagopalan,...
NDSS
1997
IEEE
13 years 11 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
NDSS
1997
IEEE
13 years 11 months ago
Securing Web Access with DCE
Brian C. Schimpf
NDSS
1997
IEEE
13 years 11 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...