CCS A*

37 papers

YearTitle / Authors
2003A composable cryptographic library with nested operations.
Michael Backes, Birgit Pfitzmann, Michael Waidner
2003A new CRT-RSA algorithm secure against bellcore attacks.
Johannes Blömer, Martin Otto, Jean-Pierre Seifert
2003A pairwise key pre-distribution scheme for wireless sensor networks.
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
2003Anomaly detection of web-based attacks.
Christopher Krügel, Giovanni Vigna
2003Automatic generation of two-party computations.
Philip D. MacKenzie, Alina Oprea, Michael K. Reiter
2003Balancing confidentiality and efficiency in untrusted relational DBMSs.
Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
2003Buffer overrun detection using linear programming and static analysis.
Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek
2003CDiff: a new reduction technique for constraint-based analysis of security protocols.
David A. Basin, Sebastian Mödersheim, Luca Viganò
2003Countering code-injection attacks with instruction-set randomization.
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis
2003Cryptographic tamper evidence.
Gene Itkis
2003DoS protection for UDP-based protocols.
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
2003Efficiency improvements for signature schemes with tight security reductions.
Jonathan Katz, Nan Wang
2003Efficient self-healing group key distribution with revocation capability.
Donggang Liu, Peng Ning, Kun Sun
2003Enhancing byte-level network intrusion detection signatures with context.
Robin Sommer, Vern Paxson
2003Establishing pairwise keys in distributed sensor networks.
Donggang Liu, Peng Ning
2003Hop-count filtering: an effective defense against spoofed DDoS traffic.
Cheng Jin, Haining Wang, Kang G. Shin
2003Incentive-based modeling and inference of attacker intent, objectives, and strategies.
Peng Liu, Wanyu Zang
2003LEAP: efficient security mechanisms for large-scale distributed sensor networks.
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
2003Learning attack strategies from intrusion alerts.
Peng Ning, Dingbang Xu
2003MECA: an extensible, expressive system and language for statically checking security properties.
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler
2003Monitoring and early warning for internet worms.
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley
2003Obfuscation of executable code to improve resistance to static disassembly.
Cullen Linn, Saumya K. Debray
2003On permissions, inheritance and role hierarchies.
Jason Crampton
2003On the performance, feasibility, and use of forward-secure signatures.
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel
2003Origin authentication in interdomain routing.
William Aiello, John Ioannidis, Patrick D. McDaniel
2003PPay: micropayments for peer-to-peer systems.
Beverly Yang, Hector Garcia-Molina
2003Print signatures for document authentication.
Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli
2003Privacy cognizant information systems.
Rakesh Agrawal
2003Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003
Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger
2003Randomized instruction set emulation to disrupt binary code injection attacks.
Elena Gabriela Barrantes, David H. Ackley, Trek S. Palmer, Darko Stefanovic, Dino Dai Zovi
2003Receiver anonymity via incomparable public keys.
Brent R. Waters, Edward W. Felten, Amit Sahai
2003Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.
Xinyuan Wang, Douglas S. Reeves
2003Security proofs for an efficient password-based key exchange.
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
2003The blocker tag: selective blocking of RFID tags for consumer privacy.
Ari Juels, Ronald L. Rivest, Michael Szydlo
2003Using graphic turing tests to counter automated DDoS attacks against web servers.
William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
2003XML access control using static analysis.
Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada
2003k-anonymous message transmission.
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper