![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
NDSS 1997: San Diego, California, USA
- Proceedings of the Network and Distributed System Security Symposium, NDSS 1997, San Diego, California, USA. IEEE Computer Society 1997, ISBN 0-8186-7767-8
Session 1: Things That Go Bump In The Net
- Nick Ogurtsov, Hilarie K. Orman, Richard Schroeppel, Sean W. O'Malley, Oliver Spatscheck:
Experimental Results of Covert Channel Limitation in One-Way Communication Systems. 2-15 - David M. Martin Jr., Sivaramakrishnan Rajagopalan, Aviel D. Rubin:
Blocking Java Applets at the Firewall. 16-26 - Abdelaziz Mounji, Baudouin Le Charlier:
Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis. 27-37
Session 2: Panel - Security Of Downloadable Executable Content
Session 3: Protocol Implementation And Analysis
- Stephen H. Brackin:
An Interface Specification Language for Automatically Analyzing Cryptographic Protocols. 40-51 - Steven M. Bellovin:
Probable Plaintext Cryptanalysis of the IP Security Protocols. 52-59 - Bryn Dole, Steven W. Lodin, Eugene H. Spafford:
Misplaced Trust: Kerberos 4 Session Keys. 60-71
Session 4: Panel - Security Of The Internet Infrastructure
Session 5: Routing Security
- Karen E. Sirois, Stephen T. Kent:
Securing the Nimrod Routing Architecture. 74-84 - Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-Aceves:
Securing Distance-Vector Routing Protocols. 85-92 - Ralf C. Hauser, Tony Przygienda, Gene Tsudik:
Reducing the Cost of Security in Link-State Routing. 93-101
Session 6: Security For The World Wide Web
- Brian C. Schimpf:
Securing Web Access with DCE. 102-108 - G. Winfield Treese:
Panel - Security and the World Wide Web. NDSS 1997
Session 7: Public Key Management
- Lourdes López-Santidrián, Justo Carracedo Gallardo:
Hierarchical Organization of Certification Authorities for Secure Environments. 112-121 - Andrew J. Young, Nada Kapidzic Cicovic, David W. Chadwick:
Trust Models in ICE-TEL. 122-133 - Marvin A. Sirbu
, John C.-I. Chuang:
Distributed Authentication in Kerberos Using Public Key Cryptography. 134-143
Panel - Web Privacy And Anonymity
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.