


default search action
5th USENIX Security Symposium 1995: Salt Lake City, Utah, USA
- Frederick M. Avolio, Steven M. Bellovin:

Proceedings of the 5th USENIX Security Symposium, Salt Lake City, Utah, USA, June 5-7, 1995. USENIX Association 1995 - Stephen T. Walker:

Keynote Address: Why are our Systems Insecure? Must they always be? USENIX Security Symposium 1995 - Ira S. Winkler, Brian Dealy:

Information Security Technology? Don't Rely on It. A Case Study in Social Engineering. - Laurent Joncheray:

A Simple Active Attack Against TCP. - Alec Muffett:

WAN-hacking with AutoHack: Auditing Security Behind the Firewall. - Don Davis, Daniel E. Geer Jr.:

Kerberos Security with Clocks Adrift. - Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:

Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX. - Chee-Seng Chow, Amir Herzberg:

Network Randomization Protocol: A Proactive Pseudo-Random Generator. - Gene H. Kim, Hilarie K. Orman, Sean W. O'Malley:

Implementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer Protocol. - David Vincenzetti, Stefano Taino, Fabio Bolognesi:

STEL: Secure TELnet. - Matt Blaze, Steven M. Bellovin:

Session-Layer Encryption. - Toshinari Takahashi, Atsushi Shimbo, Masao Murota:

File-Based Network Collaboration System. - Brian L. Kahn:

Safe Use of X Window System Protocol Across a Firewall. - Andrew Molitor:

An Architecture for Advanced Packet Filtering and Access Policy. - Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat:

A Domain and Type Enforcement UNIX Prototype. - Spencer E. Minear:

Providing Policy Control Over Object Operations in a Mach-Based System. - William A. Adamson, Jim Rees, Peter Honeyman:

Joining Security Realms: A Single Login for NetWare and Kerberos. - Aviel D. Rubin:

Independent One-Time Passwords. - Daniel L. McDonald, Randall J. Atkinson, Craig Metz:

One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication. - Ennio Pozzetti, Vidar Vetland:

Improving the Trustworthiness of Evidence Derived from Security Trace Files. - Steven M. Bellovin:

Using the Domain Name System for System Break-ins. - Paul Vixie:

DNS and BIND Security Issues. - James M. Galvin, Mark Feldman:

MIME Object Security Services: Issues in a Multi-User Environment.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














