Check out the new USENIX Web site.

...warrior''
Remote mobile users that need to access the protected network behind a firewall, using IPsec.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...work
Even hardware accelerators for big number computation cannot handle the high volume of operations that would be involved in such a DOS attack.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...protocol
We have experimented with fetching credentials from a web server, using a primitive cgi-script and a database keyed on public keys and X.509 Distinguished Names.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Angelos D. Keromytis
4/20/2000