Addressing Weaknesses in the Domain Name System Protocol
暂无分享,去创建一个
[1] Jörgen Bo Madsen. The Greatest Cracker-Case in Denmark: The Detecting, Tracing, and Arresting of Two International Crackers , 1992, USENIX Summer.
[2] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[3] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[4] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[5] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[6] Craig Hunt. TCP/IP Network Administration , 1992 .
[7] Ronald Paans,et al. Auditing the SNA/SNI environment , 1991, Comput. Secur..
[8] Stephen T. Kent,et al. Internet Privacy Enhanced Mail , 1993, CACM.
[9] Robert T. Braden,et al. Requirements for Internet Hosts - Application and Support , 1989, RFC.
[10] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[11] Dimitri P. Bertsekas,et al. Data Networks , 1986 .
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Denis Johnson. In Palo Alto , 1982 .
[14] W. Richard Stevens,et al. Unix network programming , 1990, CCRV.
[15] A. Fleischmann. Distributed Systems , 1994, Springer Berlin Heidelberg.
[16] Steven M. Bellovin,et al. There Be Dragons , 1992, USENIX Summer.
[17] Steven M. Bellovin. Pseudo-Network Drivers and Virtual Networks , 1990 .
[18] Steven M. Bellovin,et al. Using the Domain Name System for System Break-ins , 1995, USENIX Security Symposium.
[19] Paul Albitz,et al. DNS and BIND , 1994 .