default search action
5th USENIX Security Symposium 1995: Salt Lake City, Utah, USA
- Frederick M. Avolio, Steven M. Bellovin:
Proceedings of the 5th USENIX Security Symposium, Salt Lake City, Utah, USA, June 5-7, 1995. USENIX Association 1995 - Stephen T. Walker:
Keynote Address: Why are our Systems Insecure? Must they always be? USENIX Security Symposium 1995 - Ira S. Winkler, Brian Dealy:
Information Security Technology? Don't Rely on It. A Case Study in Social Engineering. - Laurent Joncheray:
A Simple Active Attack Against TCP. - Alec Muffett:
WAN-hacking with AutoHack: Auditing Security Behind the Firewall. - Don Davis, Daniel E. Geer Jr.:
Kerberos Security with Clocks Adrift. - Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX. - Chee-Seng Chow, Amir Herzberg:
Network Randomization Protocol: A Proactive Pseudo-Random Generator. - Gene H. Kim, Hilarie K. Orman, Sean W. O'Malley:
Implementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer Protocol. - David Vincenzetti, Stefano Taino, Fabio Bolognesi:
STEL: Secure TELnet. - Matt Blaze, Steven M. Bellovin:
Session-Layer Encryption. - Toshinari Takahashi, Atsushi Shimbo, Masao Murota:
File-Based Network Collaboration System. - Brian L. Kahn:
Safe Use of X Window System Protocol Across a Firewall. - Andrew Molitor:
An Architecture for Advanced Packet Filtering and Access Policy. - Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat:
A Domain and Type Enforcement UNIX Prototype. - Spencer E. Minear:
Providing Policy Control Over Object Operations in a Mach-Based System. - William A. Adamson, Jim Rees, Peter Honeyman:
Joining Security Realms: A Single Login for NetWare and Kerberos. - Aviel D. Rubin:
Independent One-Time Passwords. - Daniel L. McDonald, Randall J. Atkinson, Craig Metz:
One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication. - Ennio Pozzetti, Vidar Vetland:
Improving the Trustworthiness of Evidence Derived from Security Trace Files. - Steven M. Bellovin:
Using the Domain Name System for System Break-ins. - Paul Vixie:
DNS and BIND Security Issues. - James M. Galvin, Mark Feldman:
MIME Object Security Services: Issues in a Multi-User Environment.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.