USENIX Security '95 | Joining Security Realms: A Single Login for NetWare and Kerberos | William A. Adamson, Jim Rees, Peter Honeyman |
USENIX Security '95 | Independent One-Time Passwords | Aviel D. Rubin |
USENIX Security '95 | One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication | Daniel L. McDonald, Randall J. Atkinson, Craig Metz, Kaman Sciences Corporation |
USENIX Security '95 | Improving the Trustworthiness of Evidence Derived from Security Trace Files | Ennio Pozzetti, Vidar Vetland |
USENIX Security '95 | Using the Domain Name System for System Break-ins | Steven M. Bellovin |
USENIX Security '95 | DNS and BIND Security Issues | Paul A. Vixie |
USENIX Security '95 | MIME Object Security Services: Issues in a Multi-User Environment | James M. Galvin, Mark S. Feldman |
UNIX Security '93 | The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment | Dave Safford, Douglas Lee Schales |
UNIX Security '93 | The Persistent Hacker | Eduardo Rodriguez |
UNIX Security '93 | Sendmail Without the Superuser | Mark E. Carson |
UNIX Security '93 | Retrofitting Network Security to Third-Party Applications -- The SecureBase Experience | Jonathan I. Kamens |
UNIX Security '93 | Secure RPC Authentication (SRA) for TELNET and FTP | David R. Safford, Douglas Lee Schales, David K. Hess |
UNIX Security '92 | An Internet Gatekeeper | Herve Schauer, Christophe Wolfhugel |
UNIX Security '92 | Network (In)Security Through IP Packet Filtering | D. Brent Chapman |
UNIX Security '92 | SOCKS | David Koblas, Michelle R. Koblas |
UNIX Security '92 | TCP Wrapper: Network Monitoring, Access Control, and Booby Traps | Wietse Venema |
UNIX Security '92 | Centralized System Monitoring with Swatch | Stephen E. Hansen, E. Todd Atkins |
UNIX Security '92 | Security Aspects of a UNIX PEM Implementation | James M. Galvin, David M. Balenson |
UNIX Security '92 | Introduction to the Shadow Password Suite | John F. Haugh II |
UNIX Security '92 | Giving Customers the Tools to Protect Themselves | Shabbir J. Safdar |
UNIX Security '92 | The Greatest Cracker-Case in Denmark: The Detecting, Tracing, and Arresting of Two International Crackers | Jörgen Bo Madsen |
UNIX Security '92 | Experiences of Internet Security in Italy | Alessandro Berni, Paolo Franchi, Joy Marino |
UNIX Security '92 | An Internet Gatekeeper | Herve Schauer, Christophe Wolfhugel |
UNIX Security '92 | Restricting Network Access to System Daemons Under SunOS | William LeFebvre |
UNIX Security '92 | There Be Dragons | Steve Bellovin |