CCS A*

28 papers

YearTitle / Authors
2002A key-management scheme for distributed sensor networks.
Laurent Eschenauer, Virgil D. Gligor
2002A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante
2002A temporal key management scheme for secure broadcasting of XML documents.
Elisa Bertino, Barbara Carminati, Elena Ferrari
2002Almost entirely correct mixing with applications to voting.
Dan Boneh, Philippe Golle
2002Asynchronous verifiable secret sharing and proactive cryptosystems.
Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
2002Authenticated encryption in SSH: provably fixing the SSH binary packet protocol.
Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
2002Authenticated-encryption with associated-data.
Phillip Rogaway
2002Code red worm propagation modeling and analysis.
Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
2002Constructing attack scenarios through correlation of intrusion alerts.
Peng Ning, Yun Cui, Douglas S. Reeves
2002DRM: doesn't realy mean digital copyright management.
L. Jean Camp
2002Defending against redirect attacks in mobile IP.
Robert H. Deng, Jianying Zhou, Feng Bao
2002Design and implementation of the
Jan Camenisch, Els Van Herreweghen
2002Efficient packet marking for large-scale IP traceback.
Michael T. Goodrich
2002Efficient, DoS-resistant, secure key exchange for internet protocols.
William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis
2002Generic implementations of elliptic curve cryptography using partial reduction.
Nils Gura, Hans Eberle, Sheueling Chang Shantz
2002MOPS: an infrastructure for examining security properties of software.
Hao Chen, David A. Wagner
2002Mimicry attacks on host-based intrusion detection systems.
David A. Wagner, Paolo Soto
2002Policy algebras for access control the predicate case.
Duminda Wijesekera, Sushil Jajodia
2002Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002
Vijayalakshmi Atluri
2002Query-flood DoS attacks in gnutella.
Neil Daswani, Hector Garcia-Molina
2002Runtime verification of authorization hook placement for the linux security modules framework.
Antony Edwards, Trent Jaeger, Xiaolan Zhang
2002Scalable, graph-based network vulnerability analysis.
Paul Ammann, Duminda Wijesekera, Saket Kaushik
2002Securing passwords against dictionary attacks.
Benny Pinkas, Tomas Sander
2002Sensor-based intrusion detection for intra-domain distance-vector routing.
Vishal Mittal, Giovanni Vigna
2002Silicon physical random functions.
Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas
2002Specification-based anomaly detection: a new approach for detecting network intrusions.
R. Sekar, Ajay Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou
2002Tarzan: a peer-to-peer anonymizing network layer.
Michael J. Freedman, Robert Morris
2002The verification of an industrial payment protocol: the SET purchase phase.
Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci