USENIX Security Symposium A*

23 papers

YearTitle / Authors
1995A Domain and Type Enforcement UNIX Prototype.
Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat
1995A Simple Active Attack Against TCP.
Laurent Joncheray
1995An Architecture for Advanced Packet Filtering and Access Policy.
Andrew Molitor
1995DNS and BIND Security Issues.
Paul Vixie
1995Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
1995File-Based Network Collaboration System.
Toshinari Takahashi, Atsushi Shimbo, Masao Murota
1995Implementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer Protocol.
Gene H. Kim, Hilarie K. Orman, Sean W. O'Malley
1995Improving the Trustworthiness of Evidence Derived from Security Trace Files.
Ennio Pozzetti, Vidar Vetland
1995Independent One-Time Passwords.
Aviel D. Rubin
1995Information Security Technology? Don't Rely on It. A Case Study in Social Engineering.
Ira S. Winkler, Brian Dealy
1995Joining Security Realms: A Single Login for NetWare and Kerberos.
William A. Adamson, Jim Rees, Peter Honeyman
1995Kerberos Security with Clocks Adrift.
Don Davis, Daniel E. Geer Jr.
1995Keynote Address: Why are our Systems Insecure? Must they always be?
Stephen T. Walker
1995MIME Object Security Services: Issues in a Multi-User Environment.
James M. Galvin, Mark Feldman
1995Network Randomization Protocol: A Proactive Pseudo-Random Generator.
Chee-Seng Chow, Amir Herzberg
1995One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication.
Daniel L. McDonald, Randall J. Atkinson, Craig Metz
1995Proceedings of the 5th USENIX Security Symposium, Salt Lake City, Utah, USA, June 5-7, 1995
Frederick M. Avolio, Steven M. Bellovin
1995Providing Policy Control Over Object Operations in a Mach-Based System.
Spencer E. Minear
1995STEL: Secure TELnet.
David Vincenzetti, Stefano Taino, Fabio Bolognesi
1995Safe Use of X Window System Protocol Across a Firewall.
Brian L. Kahn
1995Session-Layer Encryption.
Matt Blaze, Steven M. Bellovin
1995Using the Domain Name System for System Break-ins.
Steven M. Bellovin
1995WAN-hacking with AutoHack: Auditing Security Behind the Firewall.
Alec Muffett