TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
C Programmer's Guide to Serial Communications
C Programmer's Guide to Serial Communications
A secure networked laboratory for kernel programming
ITiCSE '98 Proceedings of the 6th annual conference on the teaching of computing and the 3rd annual conference on Integrating technology into computer science education: Changing the delivery of computer science education
A secure unrestricted advanced systems laboratory
SIGCSE '99 The proceedings of the thirtieth SIGCSE technical symposium on Computer science education
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
Escaping the evils of centralized control with self-certifying pathnames
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
Enabling technologies for role based online decision engines
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Untrusted hosts and confidentiality: secure program partitioning
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
ACM Transactions on Computer Systems (TOCS)
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol
Proceedings of the 9th ACM conference on Computer and communications security
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
A Top-Down Look at a Secure Message
Proceedings of the 19th Conference on Foundations of Software Technology and Theoretical Computer Science
Unifying File System Protection
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Proceedings of the 11th USENIX Security Symposium
Partial outsourcing: a new paradigm for access control
Proceedings of the eighth ACM symposium on Access control models and technologies
Phoenix: a parallel programming model for accommodating dynamically joining/leaving resources
Proceedings of the ninth ACM SIGPLAN symposium on Principles and practice of parallel programming
Using Replication and Partitioning to Build Secure Distributed Systems
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Decentralized user authentication in a global file system
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Samsara: honor among thieves in peer-to-peer storage
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Current security management & Ethical issues of information technology
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
DSM '04 Proceedings of the 1st international doctoral symposium on Middleware
Off-the-record communication, or, why not to use PGP
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
glogin - A Multifunctional, Interactive Tunnel into the Grid
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
SSU: Extending SSH for Secure Root Administration
LISA '98 Proceedings of the 12th USENIX conference on System administration
Deployme: Tellme's Package Management and Deployment System
LISA '00 Proceedings of the 14th USENIX conference on System administration
Splat: A Network Switch/Port Configuration Management Tool
LISA '03 Proceedings of the 17th USENIX conference on System administration
How to make secure email easier to use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Secure off-the-record messaging
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
StarBED and SpringOS: large-scale general purpose network testbed and supporting software
valuetools '06 Proceedings of the 1st international conference on Performance evaluation methodolgies and tools
A communication-computation efficient group key algorithm for large and dynamic groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enforcing provisioning and authorization policy in the Antigone system
Journal of Computer Security
REX: secure, extensible remote execution
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
The Journal of Machine Learning Research
A digital preservation network appliance based on OpenBSD
BSDC'03 Proceedings of the BSD Conference 2003 on BSD Conference
Self-securing storage: protecting data in compromised system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Secure untrusted data repository (SUNDR)
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Specifications of a high-level conflict-free firewall policy language for multi-domain networks
Proceedings of the 12th ACM symposium on Access control models and technologies
A resilient access control scheme for secure electronic transactions
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Lightweight security primitives for E-Commerce
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Journaling versus soft updates: asynchronous meta-data protection in file systems
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Heimdal: an independent implementation of Kerberos 5
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Cget, Cput, and stage: safe file transport tools for the internet
ATEC '97 Proceedings of the annual conference on USENIX Annual Technical Conference
TARP: Ticket-based address resolution protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic pharming attacks and locked same-origin policies for web browsers
Proceedings of the 14th ACM conference on Computer and communications security
Implementation of secure applications in self-reconfigurable systems
Microprocessors & Microsystems
Plan 9 authentication in Linux
ACM SIGOPS Operating Systems Review - Research and developments in the Linux kernel
NetAuth: supporting user-based network services
SS'08 Proceedings of the 17th conference on Security symposium
An interactive job manager for globus
EUROCAST'07 Proceedings of the 11th international conference on Computer aided systems theory
An SSH-based toolkit for user-based network services
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Optimizing tunneled grid connectivity across firewalls
AusGrid '09 Proceedings of the Seventh Australasian Symposium on Grid Computing and e-Research - Volume 99
Digital identity security architecture in Ethos
Proceedings of the 7th ACM workshop on Digital identity management
Strengthening password-based authentication protocols against online dictionary attacks
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Improved thumbprint and its application for intrusion detection
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Finding TCP packet round-trip time for intrusion detection: algorithm and analysis
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Absolute pwnage: a short paper about the security risks of remote administration tools
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Fine-Grained Access Control in the Chirp Distributed File System
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Mosh: an interactive remote shell for mobile clients
USENIX ATC'12 Proceedings of the 2012 USENIX conference on Annual Technical Conference
Mining your Ps and Qs: detection of widespread weak keys in network devices
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Hi-index | 0.00 |
SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, and symmetric algorithms (e.g., IDEA or three-key triple-DES) for encrypting transferred data. SSH is intended as a replacement for the existing rsh, rlogin, rcp, rdist, and telnet protocols. SSH is currently (March 1996) being used at thousands of sites in at least 50 countries. Its users include top universities, research laboratories, many major corporations, and numerous smaller companies and individuals. The SSH protocol can also be used as a generic transport layer encryption mechanism, providing both host authentication and user authentication, together with privacy and integrity protection.