New encryption technology closes WLAN security loopholes

ji at research.att.com ji at research.att.com
Mon Sep 24 18:44:18 EDT 2001


> Or in other words, the first requirement for perimeter security is a perimeter.

In increasingly many environments, the term "perimeter" makes little sense.
See, for example, the CCS-2000 paper on Distributed Firewalls by Sotiris
Ioannidis et al.  You can get it (among other places) from
http://www.research.att.com/~smb/papers/ccs-df.pdf

/ji

(for the curious, the Ioannidis on that paper is my brother, not I).




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list