Back to Results
First PageMeta Content
Cryptographic protocols / Internet / Cypherpunks / Internet protocols / Steven M. Bellovin / Firewall / Distributed firewall / Interlock protocol / Matt Blaze / Computing / Computer network security / Cryptography


Microsoft Word - DEC00029673.doc
Add to Reading List

Document Date: 2012-05-24 13:45:17


Open Document

File Size: 101,13 KB

Share Result on Facebook

City

Dallas / Washington / D.C. / Salt Lake City / Reading / Linz / Oakland / Marseille / San Jose / Fairfax / Router / Athens / Prague / San Diego / /

Company

Prentice-Hall / Collaborative Enterprises / CRC Press / National Academies Press / National Academy Press / AES / AT&T Labs / AT&T / ACM Computer / SONY / ACM Press / AT&T Bell Laboratories / ICANN / Practical Reusable UNIX Software / John Wiley & Sons / /

Country

Austria / Greece / /

EntertainmentAwardEvent

the Usenix Lifetime Achievement Award / /

Facility

Columbia University / University of North Carolina / Chapel Hill / University of Pennsylvania / /

IndustryTerm

software engineering / secure web browser / communications network / anti-virus software / internet protocols / telephony / virtual networks / Internet wiretapping / Internet Society Symposium / authentication technologies / Internet Security / Internet routing / virtual private services / security protocols / telecommunications fits / privacy by network / hash algorithm / software aids / malicious software / Internet Beseiged / Internet Measurement Workshop / domain name systems / secure communications / broadband access network / /

Movie

Getting it Right / /

NaturalFeature

Chapel Hill / /

OperatingSystem

UNIX / Solaris / MS-DOS / DoS / /

Organization

Columbia University / IETF IPng Directorate / Judiciary Committee / ICANN Protocol Supporting Organization / Internet Engineering Task Force / Subcommittee on the Constitution / Internet Architecture Board / House Select Committee on Homeland Security / Subcommittee on Cybersecurity / Science / Research / & Development / Homeland Security Science and Technology Advisory Committee / University of Pennsylvania / University of North Carolina / Department of Homeland Security Science / Federal Bureau of Investigation / Stability Advisory Committee / National Academy of Engineering / /

Person

Ross Anderson / Aviel D. Rubin / Scott Shenker / David A. Patterson / Angelos Keromytis / Jim Ellis / Tom Truscott / Peter G. Neumann / William Aiello / Alan Inouye / Omer Reingold / Gene Spafford / Susan Landau / Yakov Rekhter / William R. Cheswick / David Farber / STEVEN M. BELLOVIN / Michael Merritt / Matt Blaze / Peter Neumann / S. Herman / David L. Parnas / Peter M. Gleitz / Herbert S. Lin / John L. Hennessy / Vern Paxson / Steps Towards Reducing / J. Lanza / IETF ITRACE / Ronald L. Rivest / Angelos D. Keromytis / Sally Floyd / Jeffrey I. Schiller / Eric K. Rescorla / Sotiris Ioannidis / Fred B. Schneider / Dorothy Denning / Paul Resnick / David A. Wagner / Emden R. Gansner / Jonathan M. Smith / Hal Abelson / Lynette I. Millett / Uri Blumenthal / Bill Cheswick / Peter Gregory / Josh Benaloh / Bruce Schneier / Stephen T. Kent / Peter Honeyman / LISA XIII / Steps Towards Reducing Unwanted Traffic / /

Position

advisor / system administrator / session tty manager / Co-chair / Usenix Security Symposium / administrator / Major / representative / Professor of Computer Science / Chair / program committee / attorney / editor / editor / CRC Computer Science and Engineering Handbook / Vice-chair / program committee / Co-chair / Chair / Adjunct Professor of Computer Science / Security Area co-director / King / /

ProvinceOrState

Virginia / Utah / California / Texas / Pennsylvania / North Carolina / Massachusetts / /

PublishedMedium

IEEE Transactions on Information Theory / Communications of the ACM / Scientific American / /

Technology

third-party encryption / Information Technology / 5 / 241 / 599 Cryptographic protocol / TCP/IP protocol / Session-layer encryption / Cryptography / network address translation / IP security protocols / authentication technologies / 5 / 440 / 635 Cryptographic protocol / IPv6 / hash algorithm / VPN / internet protocols / operating systems / anti-virus software / broadband access / DNS / firewall / VOIP / /

URL

http /

SocialTag