- ...warrior''
- Remote mobile users that need to access the protected
network behind a firewall, using IPsec.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...work
- Even hardware accelerators for big number
computation cannot handle the high volume of operations that would be
involved in such a DOS attack.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...protocol
- We have
experimented with fetching credentials from a web server, using a
primitive cgi-script and a database keyed on public keys and X.509
Distinguished Names.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.