Back to Results
First PageMeta Content
Network architecture / Computer network security / Address Resolution Protocol / ARP spoofing / Dynamic Host Configuration Protocol / DNS spoofing / DSniff / IP address / Man-in-the-middle attack / Internet standards / Internet / Computing


TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat
Add to Reading List

Open Document

File Size: 230,60 KB

Share Result on Facebook

City

San Jose / Tel Aviv / New York / Washington / DC / SSH / San Diego / /

Company

Patrick McDaniel Systems / TARP Networks / DoS / ACM Press / Address Resolution Protocol / Internet Infrastructure Security / Cisco Systems / /

Country

Anguilla / Israel / United States / /

/

Event

FDA Phase / /

Facility

Engineering The Pennsylvania State University / Massachusetts Institute of Technology / /

IndustryTerm

static assignment network / instantaneous online verification / kernel processing / network-level detection device / network capable devices / local certificate management services / Wireless access points / security technologies / Wireless vulnerabilities / distribution protocol / Dynamic host configuration protocol / contemporary identity-based systems / network auditing / physical local network / internal network / local area network / configuration server / resource poor devices / security protocol / secure server / network time protocol / resolution services / low cost solutions / resolution protocol / cryptographic protocols / revocation services / Internet Public Key Infrastructure / host-level detection services / secure solution / automated management tools / ethernet hardware / /

NaturalFeature

Indies / /

OperatingSystem

UNIX / Cisco IOS / Linux / /

Organization

Massachusetts Institute of Technology / Internet Infrastructure Security Laboratory Department of Computer Science / USENIX Association / Internet Engineering Task Force / International Financial Cryptography Association / Internet Society / MIT / The Pennsylvania State University / /

Person

M. Malkin / William Enck / T. D. Wu / Kevin Butler / Megan McDaniel / Ruth Lootah / D. Boneh / Flexible Approach / /

Position

editor / Financial Cryptography / local Local Ticket Agent / General / network administrator / Private / /

Product

Ticket / such / any / /

ProvinceOrState

New York / California / Massachusetts / /

Region

British West Indies / /

Technology

RAM / Secure Border Gateway Protocol / Status Protocol / subnet mask / Linux / PKI / tcp/ip protocol / security technologies / cryptography / 4 processors / Wireless access / resolution protocol / tested protocols / network time protocol / distribution protocol / LAN / ipv6 / Public Key Infrastructure / MAC address / private key / Secure Shell / 3 processor / Public-Key Infrastructure / Ethernet / security protocol / Dynamic host configuration protocol / public key / DNS / three tested protocols / caching / Gigabit Ethernet / verified using the sender’s public key / /

URL

http /

SocialTag