Abstract is missing.
- Safe Use of X Window System Protocol Across a FirewallBrian L. Kahn. [doi]
- Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIXPau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk. [doi]
- File-Based Network Collaboration SystemToshinari Takahashi, Atsushi Shimbo, Masao Murota. [doi]
- A Simple Active Attack Against TCPLaurent Joncheray. [doi]
- Independent One-Time PasswordsAviel D. Rubin. [doi]
- WAN-hacking with AutoHack: Auditing Security Behind the FirewallAlec Muffett. [doi]
- Implementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer ProtocolGene H. Kim, Hilarie K. Orman, Sean W. O'Malley. [doi]
- Improving the Trustworthiness of Evidence Derived from Security Trace FilesEnnio Pozzetti, Vidar Vetland. [doi]
- DNS and BIND Security IssuesPaul Vixie. [doi]
- Providing Policy Control Over Object Operations in a Mach-Based SystemSpencer E. Minear. [doi]
- An Architecture for Advanced Packet Filtering and Access PolicyAndrew Molitor. [doi]
- Using the Domain Name System for System Break-insSteven M. Bellovin. [doi]
- Kerberos Security with Clocks AdriftDon Davis, Daniel E. Geer. [doi]
- Network Randomization Protocol: A Proactive Pseudo-Random GeneratorChee-Seng Chow, Amir Herzberg. [doi]
- One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong AuthenticationDaniel McDonald, Randall J. Atkinson, Craig Metz. [doi]
- Information Security Technology? Don't Rely on It. A Case Study in Social EngineeringIra S. Winkler, Brian Dealy. [doi]
- Keynote Address: Why are our Systems Insecure? Must they always be?Stephen T. Walker.
- MIME Object Security Services: Issues in a Multi-User EnvironmentJames M. Galvin, Mark Feldman. [doi]
- Session-Layer EncryptionMatt Blaze, Steven M. Bellovin. [doi]
- A Domain and Type Enforcement UNIX PrototypeLee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat. [doi]
- Joining Security Realms: A Single Login for NetWare and KerberosWilliam A. Adamson, Jim Rees, Peter Honeyman. [doi]
- STEL: Secure TELnetDavid Vincenzetti, Stefano Taino, Fabio Bolognesi. [doi]