Dan Kaminsky

Results: 33



#Item
1

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41
    2Domain name system / Internet Standards / Internet protocols / Cyberwarfare / Computer network security / Domain Name System Security Extensions / Denial-of-service attack / Dan Kaminsky / Cloudmark / Internet security / Computer security / Comparison of DNS server software

    Telecom/Datacom Market Fundamental Drivers

    Add to Reading List

    Source URL: www.cloudmark.com

    Language: English - Date: 2014-11-13 13:40:39
    3Domain name system / Computing / Internet / Network architecture / DNS spoofing / OpenDNS / Name server / Dynamic DNS / Fast flux / IID / Dan Kaminsky / Botnet

    IID WHITE PAPER Surveying the DNS Threat Landscape by Rod Rasmussen and Paul Vixie Executive summary Strong enterprise security in 2013 requires a

    Add to Reading List

    Source URL: internetidentity.com

    Language: English
    4

    Attacking Distributed Systems The DNS Case Study Dan Kaminsky, CISSP Senior Security Consultant Copyright© 2003 Avaya Inc. All rights reserved

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:29
      5Computing / Domain name system / Port / Transmission Control Protocol / Name server / DNS spoofing / Dan Kaminsky / Internet / Network architecture / Internet protocols

      JPJ8;D@E Security Lessons K_\jf]kZ_\npZ\ek\if]k_\@ek\ie\k

      Add to Reading List

      Source URL: www.linux-magazine.com

      Language: English
      6Internet protocols / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Dan Kaminsky / Zone file / Internet / Domain name system / Network architecture

      DNSSEC Introduction Principles Deployment This document is a result of work by the Network Startup Resource Center (NSRC at http://nsrc.org). This document may be freely copied, modified, and otherwise re-used on the con

      Add to Reading List

      Source URL: nsrc.org

      Language: English - Date: 2015-02-17 17:22:37
      7Internet protocols / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Dan Kaminsky / Name server / .dk / ICANN / Internet / Domain name system / Network architecture

      DNSSEC Tutorial APNIC 30 Gold Coast, Australia 24 August 2010

      Add to Reading List

      Source URL: meetings.apnic.net

      Language: English - Date: 2010-08-23 20:44:14
      8Internet protocols / Computing / Internet standards / Dan Kaminsky / Year of birth missing / Domain Name System Security Extensions / Name server / Time to live / DNS spoofing / Internet / Domain name system / Network architecture

      PDF Document

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-05-28 15:51:26
      9Cryptographic protocols / X.509 / Certificate authority / PKCS / Public key certificate / HTTP Secure / Dan Kaminsky / Root certificate / Basic Encoding Rules / Cryptography / Public-key cryptography / Key management

      PKI Layer Cake: New Collision Attacks Against the Global X.509 Infrastructure Dan Kaminsky1 , Meredith L. Patterson, and Len Sassaman2 1 2

      Add to Reading List

      Source URL: www.cosic.esat.kuleuven.be

      Language: English
      10Hashing / Computing / Search algorithms / MD5 / HMAC / Crypt / Collision attack / SHA-1 / Md5sum / Error detection and correction / Cryptography / Cryptographic hash functions

      1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2004-12-06 19:52:41
      UPDATE