COOTS '95 | Integration of Concurrency Control in a Language with Subtyping and Subclassing | Carlos Baquero, Rui Oliveira, Francisco Moura |
COOTS '95 | Generic Containers for a Distributed Object Store | Carsten Weich |
COOTS '95 | Media-Independent Interfaces in a Media-Dependent World | Ken Arnold, Kee Hinckley, Eric Sheinbrood |
USENIX Security '95 | Information Security Technology? Don't Rely on It. A Case Study in Social Engineering | Ira S. Winkler, Brian Dealy |
USENIX Security '95 | A Simple Active Attack Against TCP | Laurent Joncheray |
USENIX Security '95 | WAN-hacking with AutoHack: Auditing Security Behind the Firewall | Alec Muffet |
USENIX Security '95 | Kerberos Security with Clocks Adrift | Don Davis, Daniel E. Geer |
USENIX Security '95 | Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX | Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk |
USENIX Security '95 | Network Randomization Protocol: A Proactive Pseudo-Random Generator | Chee-Seng Chow, Amir Herzberg |
USENIX Security '95 | Implementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer Protocol | Gene H. Kim, Hilarie Orman, Sean O'Malley |
USENIX Security '95 | STEL: Secure TELnet | David Vincenzetti, Stefano Taino, Fabio Bolognesi |
USENIX Security '95 | Session-Layer Encryption | Matt Blaze, Steven M. Bellovin |
USENIX Security '95 | File-Based Network Collaboration System | Toshinari Takahashi, Atsushi Shimbo, Masao Murota |
USENIX Security '95 | Safe Use of X Window System Protocol Across a Firewall | Brian L. Kahn |
USENIX Security '95 | An Architecture for Advanced Packet Filtering and Access Policy | Andrew Molitor |
USENIX Security '95 | A Domain and Type Enforcement UNIX Prototype | Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat |
USENIX Security '95 | Providing Policy Control Over Object Operations in a Mach-Based System | Spencer E. Minear |
USENIX Security '95 | Joining Security Realms: A Single Login for NetWare and Kerberos | William A. Adamson, Jim Rees, Peter Honeyman |
USENIX Security '95 | Independent One-Time Passwords | Aviel D. Rubin |
USENIX Security '95 | One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication | Daniel L. McDonald, Randall J. Atkinson, Craig Metz, Kaman Sciences Corporation |
USENIX Security '95 | Improving the Trustworthiness of Evidence Derived from Security Trace Files | Ennio Pozzetti, Vidar Vetland |
USENIX Security '95 | Using the Domain Name System for System Break-ins | Steven M. Bellovin |
USENIX Security '95 | DNS and BIND Security Issues | Paul A. Vixie |
USENIX Security '95 | MIME Object Security Services: Issues in a Multi-User Environment | James M. Galvin, Mark S. Feldman |
Second USENIX Symposium on Mobile and Location-Independent Computing | Cluster-based Approach for Routing in Ad-Hoc Networks | P. Krishna, M. Chatterjee, N. H. Vaidya, D. K. Pradhan |