Search results

    Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography USENIX ATC '06Steven M. Bellovin
    Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research USENIX ATC '06Butler Lampson
    Routing Without Tears, Bridging Without Danger USENIX ATC '06Radia Perlman
    An Introduction to Software Radio USENIX ATC '06Eric Blossom
    Hackers and Founders USENIX ATC '06Paul Graham
    Real Operating Systems for Real-time Motion Control USENIX ATC '06Trevor Blackwell
    Opening RemarksNSDI '06
    Greetings from a Filesystem UserFAST '05Jim Gray
    Scaling Search Beyond the Public WebLISA '05Qi Lu
    What Big Sites Can Learn from Little SitesLISA '05Tom Limoncelli
    Building MIT's Stata Center: An IT PerspectiveLISA '05Garrett Wollman
    Under 200: Applying IS Best Practices to Small CompaniesLISA '05Strata Rose Chalup
    What's a PKI, Why Would I Want One, and How Should it Be Designed?LISA '05Radia Perlman
    Modern Trends in UNIX and Linux Infrastructure ManagementLISA '05Luke Kanies
    Incident Command for IT: What We Can Learn from the Fire DepartmentLISA '05Brent Chapman
    Automatic PC Desktop Management with Virtualization TechnologyLISA '05Monica Lam
    What's the Worst That Could Happen?LISA '05Peyton Engel
    Network Black Ops: Extracting Unexpected Functionality from Existing Networks LISA '05Dan Kaminsky
    Internet Counter-Intelligence: Offense and DefenseLISA '05Lance Cottrell
    Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV)LISA '05Paul Vixie
    Picking Locks with CryptologyLISA '05Matt Blaze
    How Sysadmins Can Protect Free Speech and Privacy on the Electronic FrontierLISA '05Kevin Bankston
    Wireless SecurityLISA '05Michael H. Warfield
    Weblogs, Wikis, and RSS for System AdministratorsLISA '05Jonas Luster
    Using Your Body for Authentication: A Biometrics Guide for System AdministratorsLISA '05Michael R. Crusoe