New encryption technology closes WLAN security loopholes
ji at research.att.com
ji at research.att.com
Mon Sep 24 18:44:18 EDT 2001
> Or in other words, the first requirement for perimeter security is a perimeter.
In increasingly many environments, the term "perimeter" makes little sense.
See, for example, the CCS-2000 paper on Distributed Firewalls by Sotiris
Ioannidis et al. You can get it (among other places) from
http://www.research.att.com/~smb/papers/ccs-df.pdf
/ji
(for the curious, the Ioannidis on that paper is my brother, not I).
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list