Journal: Computer Networks

Volume 31, Issue 8

787 -- 804Refik Molva. Internet security architecture
805 -- 822Hervé Debar, Marc Dacier, Andreas Wespi. Towards a taxonomy of intrusion-detection systems
823 -- 830Carl M. Ellison. The nature of a useable PKI
831 -- 860Sean W. Smith, Steve Weingart. Building a high-performance, programmable secure coprocessor
861 -- 870N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner. Authenticating public terminals
871 -- 884Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik. Untraceable mobility or how to travel incognito
885 -- 894Ralf C. Hauser, Tony Przygienda, Gene Tsudik. Lowering security overhead in link state routing