Papers

Search results

    ConferenceTitleAuthor(s)
    5th USENIX UNIX Security SymposiumKerberos Security with Clocks AdriftDon Davis, Daniel E. Geer
    5th USENIX UNIX Security SymposiumDesign and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIXPau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
    5th USENIX UNIX Security SymposiumNetwork Randomization Protocol: A Proactive Pseudo-Random GeneratorChee-Seng Chow
    5th USENIX UNIX Security SymposiumImplementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer ProtocolGene H. Kim, Hilarie Orman, Sean O'Malley
    5th USENIX UNIX Security SymposiumSTEL: Secure TELnetDavid Vincenzetti, Fabio Bolognesi, Stefano Taino
    5th USENIX UNIX Security SymposiumSession-Layer EncryptionMatt Blaze, Steven M. Bellovin
    Second USENIX Symposium on Mobile and Location-Independent ComputingSystem Isolation and Network Fast-Fail Capability in SolarisGabriel Montenegro, Steve Drach
    Second USENIX Symposium on Mobile and Location-Independent ComputingA Generic Multicast Transport Service to Support Disconnected OperationSilvano Maffeis, Walter Bischofberger, Kai-Uwe M"atzel
    Second USENIX Symposium on Mobile and Location-Independent ComputingPartially Connected OperationL.B. Huston, P. Honeyman
    Second USENIX Symposium on Mobile and Location-Independent ComputingA Distributed Software Architecture for GPS-Driven Mobile ApplicationsThomas G. Dennehy
    Second USENIX Symposium on Mobile and Location-Independent ComputingEnergy Efficient Data Filtering and Communication in Mobile Wireless ComputingTomasz Imielinski, Sarma Peyyeti, Monish Gupta
    Second USENIX Symposium on Mobile and Location-Independent ComputingAdaptive Disk Spin-down Policies for Mobile ComputersFred Douglis, Brian Bershad, P. Krishnan
    Second USENIX Symposium on Mobile and Location-Independent ComputingCluster-based Approach for Routing in Ad-Hoc NetworksP. Krishna, D. K. Pradhan, M. Chatterjee
    Second USENIX Symposium on Mobile and Location-Independent ComputingHandoff and System Support for Indirect TCP/IPAjay Bakre, B.R. Badrinath
    Second USENIX Symposium on Mobile and Location-Independent ComputingWireless Adapter Architecture for Mobile ComputingJohn Trotter, Mark Cravatts
    Second USENIX Symposium on Mobile and Location-Independent ComputingMCE: An Integrated Mobile Computing Environment and Simulation TestbedRamki Rajagopalan, S. Venkatesan, Sridhar Alagar
    Second USENIX Symposium on Mobile and Location-Independent ComputingA Network Emulator to Support the Development of Adaptive ApplicationsNigel Davies, Adrian Friday, Gordon S. Blair, Keith Cheverst
    Second USENIX Symposium on Mobile and Location-Independent ComputingA Programming Interface for Application-Aware Adaptation in Mobile ComputingBrian D. Noble, Morgan Price, M. Satyanarayanan
    USENIX 1995 Technical ConferenceKeynote AddressMark Weiser
    USENIX 1995 Technical ConferencePortals in 4.4BSDW. Richard Stevens, Jan-Simon Pendry
    USENIX 1995 Technical ConferenceDynamic Vnodes - Design and ImplementationAju John
    USENIX 1995 Technical ConferenceUnion Mounts in 4.4BSD-LiteMarshall Kirk McKusick
    USENIX 1995 Technical ConferenceEvaluation of Design Alternatives for a Cluster File SystemMurthy Devarakonda, Ajay Mohindra, Jill Simoneaux, William H. Tetzlaff
    USENIX 1995 Technical ConferenceMulti-resident AFS: An Adventure in Mass StorageJonathan S. Goldick, Kathy Benninger, Christopher Kirby, Christopher Maher, Bill Zumach
    USENIX 1995 Technical ConferenceRAMA: Easy Access to a High-Bandwidth Massively Parallel File SystemEthan L. Miller, Randy H. Katz

Pages