Title |
Speakers |
Summary |
Topic Types |
Information Security Technology? Don'T Rely On It. A Case Study In Social Engineering |
Ira S. Winkler
,
Brian Dealy
|
|
Security
|
A Simple Active Attack Against Tcp |
Laurent Joncheray
|
|
Security
|
Wan-Hacking With Autohack: Auditing Security Behind The Firewall |
Alec Muffet
|
|
Security
Firewall
Auditing
|
Kerberos Security With Clocks Adrift |
Don Davis
|
|
Security
|
Design And Implementation Of Modular Key Management Protocol And Ip Secure Tunnel On Aix |
Pau-chen Cheng
,
Juan A. Garay
,
Amir Krawczyk
|
|
Security
|
Network Randomization Protocol: A Proactive Pseudo-Random Generator |
Chee-seng Herzberg
|
|
Security
|
Implementing A Secure Rlogin Environment: A Case Study Of Using A Secure Network Layer Protocol |
Gene H. Kim
,
Hilarie O'malley
|
|
Security
|
Stel: Secure Telnet |
David Vincenzetti
,
Stefano Bolognesi
|
|
Security
|
Session-Layer Encryption |
Matt Bellovin
|
|
Security
|
Safe Use Of X Window System Protocol Across A Firewall |
Brian L. Kahn
|
|
Security
Firewall
|
An Architecture For Advanced Packet Filtering And Access Policy |
Andrew Molitor
|
|
Security
Access
|
A Domain And Type Enforcement Unix Prototype |
Lee Badger
,
Daniel F. Sterne
,
David Walker
,
Haghighat
|
|
Security
Unix
|
Providing Policy Control Over Object Operations In A Mach-Based System |
Spencer E. Minear
|
|
Security
|
Joining Security Realms: A Single Login For Netware And Kerberos |
William A. Adamson
,
Jim Honeyman
|
|
Security
|
Independent One-Time Passwords |
Aviel D. Rubin
|
|
Security
|
One-Time Passwords In Everything (Opie): Experiences With Building And Using Strong Authentication |
Daniel Atkinson
|
|
Security
|
Improving The Trustworthiness Of Evidence Derived From Security Trace Files |
Ennio Pozzetti
,
Politecnico Vetland
|
|
Security
|
Using The Domain Name System For System Break-Ins |
Steven M. Bellovin
|
|
Security
|
Dns And Bind Security Issues |
Paul Vixie
|
|
Security
DNS
|
Mime Object Security Services: Issues In A Multi-User Environment |
James Feldman
|
|
Security
|