Check out the new USENIX Web site. next up previous
Next: Misconfigurations Up: Listen and Whisper: Security Previous: Level of Protection


Related Work

In this section, we will present related work as well as try to motivate our work in comparison to previous approaches to this problem. We classify related work based on the threat model.



Subsections

116 2004-02-12