Papers tagged network security
- Building Secure and Reliable Network Applications
- Eluding Carnivores: File Sharing with Strong Anonymity
- Fast, Accurate Detection of 802.11 Wireless Rogue Access Points
- Ideal Hash Trees
- Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
- Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
- On the Security of Next Generation Data Center Networks
- Preventing TLS Man-in-the-Middle Attacks in Real-time Video Communication Networks
- The Internet Census 2012 Dataset: An Ethical Examination
- Tor: The Second-Generation Onion Router
- Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms