Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Stephen T. Kent"'
Autor:
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Authentication Technologies and Their Privacy Implications, Lynette I. Millett, Stephen T. Kent
Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubi
Autor:
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Authentication Technologies and Their Privacy Implications, Lynette I. Millett, Stephen T. Kent
IDs—Not That Easy highlights some of the challenging policy, procedural, and technological issues presented by nationwide identity systems. In the wake of the events of September 11, 2001, nationwide identity systems have been proposed to better tr
Autor:
Luis Sanchez, Beverly Schwartz, Fabrice Tchakountio, Christine Elaine Jones, Alex C. Snoeren, Stephen T. Kent, Craig Partridge, W. Timothy Strayer
Publikováno v:
IEEE/ACM Transactions on Networking. 10:721-734
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's origin, widespread packet forwarding techniques such as NAT and encapsulation m
Autor:
Stephen T. Kent, John K. Zao, Joshua Gahm, Gregory Donald Troxel, M. Condell, Isidro Marcos Castineyra, Nina Yuan, Pam Helinek
Publikováno v:
Wireless Networks. 5:373-390
The need of scaleable key management support for Mobile IP, especially the route‐optimized Mobile IP, is well known. In this paper, we present the design and the implementation of a public key management system that can be used with IETF basic and
Autor:
Whitfield Diffie, Susan Landau, David L. Sobel, Scott Charney, Douglas Miller, Clinton Brooks, Stephen T. Kent, Anthony Lauck, Dorothy E. Denning, Peter G. Neumann
Publikováno v:
Communications of the ACM. 37:115-121
Autor:
Stephen T. Kent
Publikováno v:
StandardView. 2:78-85
Autor:
Stephen T. Kent
Publikováno v:
Communications of the ACM. 36:48-60
Privacy Enhanced Mail (PEM) consists of extensions to existing message processing software plus a key management infrastructure. These combine to provide users with a facility in which message confidentiality, authenticity, and integrity can be effec
Publikováno v:
MILCOM 2007 - IEEE Military Communications Conference.
This paper presents an analysis of IPv6 and its support protocols from the point of view of Information Assurance. It describes the IPv6 protocol suite, compares and contrasts it to the IPv4 protocol suite, and identifies IA issues that will arise du
Autor:
Stephen T. Kent
Publikováno v:
Public Key Infrastructure ISBN: 9783540351511
EuroPKI
EuroPKI
The Border Gateway Protocol (BGP) [1] is the foundation of inter-domain Internet routing. A number of papers have described how BGP is highly vulnerable to a wide range of attacks [2, 3], and several proposals have been offered to secure BGP [4, 5, 6
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bc51935c9bd0beca7786b7e5de42021e
https://doi.org/10.1007/11774716_10
https://doi.org/10.1007/11774716_10
Autor:
Stephen T. Kent
Publikováno v:
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection ISBN: 9783540201854
Communications and Multimedia Security
Communications and Multimedia Security
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is highly vulnerable to a variety of malicious attacks and benign operator
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3e12f41b9336845af5cc5740768a5692
https://doi.org/10.1007/978-3-540-45184-6_4
https://doi.org/10.1007/978-3-540-45184-6_4