default search action
DIMACS Workshop: Network Threats 1996
- Rebecca N. Wright, Peter G. Neumann:
Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996. DIMACS Series in Discrete Mathematics and Theoretical Computer Science 38, DIMACS/AMS 1998, ISBN 978-0-8218-0832-0 - Foreword. Network Threats 1996: ix-
- Preface. Network Threats 1996: xi-
- Catherine Meadows:
A representation of protocol attacks for risk assessment. 1-10 - Dan Zhou, Shiu-Kai Chin:
Verifying privacy enhanced mail functions with higher order logic. 11-20 - Marc Joye, Jean-Jacques Quisquater:
Cryptanalysis of RSA-type cryptosystems: A visit. 21-31 - Sarvar Patel:
Information leakage in encrypted key exchange. 33-40 - Adam Shostack:
Observed weaknesses in security dynamics' client/server protocol. 41-54 - Drew Dean:
Web security: A high level view. 55-57 - Dan S. Wallach, Jim A. Roskind, Edward W. Felten:
Flexible, extensible Java security using digital signatures. 59-74 - Mike Burmester, Yvo Desmedt, Gregory Kabatianskii:
Trust and security: A new look at the Byzantine generals problem. 75-83 - Robert J. Hall:
Channels: Avoiding unwanted electronic mail. 85-101 - Cynthia Cullen:
Demonstration of hacker techniques. 103-110
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.