CCS A*

43 papers

YearTitle / Authors
2005A framework for concrete reputation-systems with applications to history-based access control.
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
2005A model and architecture for pseudo-random generation with applications to /dev/random.
Boaz Barak, Shai Halevi
2005A modular correctness proof of IEEE 802.11i and TLS.
Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell
2005Aggregated path authentication for efficient BGP security.
Meiyuan Zhao, Sean W. Smith, David M. Nicol
2005An auctioning reputation system based on anomaly.
Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd
2005Applications of secure electronic voting to automated privacy-preserving troubleshooting.
Qiang Huang, David Jao, Helen J. Wang
2005Automated trust negotiation using cryptographic credentials.
Jiangtao Li, Ninghui Li, William H. Winsborough
2005Automatic diagnosis and response to memory corruption vulnerabilities.
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt
2005Automatic placement of authorization hooks in the linux security modules framework.
Vinod Ganapathy, Trent Jaeger, Somesh Jha
2005Biometrics hit the mainstream: an analysis of security and privacy implications.
Vance Bjorn
2005CPOL: high-performance policy evaluation.
Kevin Borders, Xin Zhao, Atul Prakash
2005Control-flow integrity.
Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
2005Countering DoS attacks with stateless multipath overlays.
Angelos Stavrou, Angelos D. Keromytis
2005Deciding security of protocols against off-line guessing attacks.
Mathieu Baudet
2005Direct chosen ciphertext security from identity-based techniques.
Xavier Boyen, Qixiang Mei, Brent Waters
2005Dynamic and efficient key management for access hierarchies.
Mikhail J. Atallah, Keith B. Frikken, Marina Blanton
2005Exploiting open functionality in SMS-capable cellular networks.
William Enck, Patrick Traynor, Patrick D. McDaniel, Thomas F. La Porta
2005Fast and automated generation of attack signatures: a basis for building self-protecting servers.
Zhenkai Liang, R. Sekar
2005Fast dictionary attacks on passwords using time-space tradeoff.
Arvind Narayanan, Vitaly Shmatikov
2005Homeland security: cyber security R&D initiatives.
W. Douglas Maughan
2005Identity-based encryption from algorithm to enterprise deployment.
Guido Appenzeller
2005Improving Brumley and Boneh timing attack on unprotected SSL implementations.
Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
2005Keyboard acoustic emanations revisited.
Li Zhuang, Feng Zhou, J. D. Tygar
2005Misbehaving TCP receivers can cause internet-wide congestion collapse.
Rob Sherwood, Bobby Bhattacharjee, Ryan Braud
2005Modeling insider attacks on group key-exchange protocols.
Jonathan Katz, Ji Sun Shin
2005New approaches for deniable authentication.
Mario Di Raimondo, Rosario Gennaro
2005Obfuscated databases and group privacy.
Arvind Narayanan, Vitaly Shmatikov
2005On authenticated computing and RSA-based authentication.
Jean-Pierre Seifert
2005On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong
2005On the cost-ineffectiveness of redundancy in commercial P2P computing.
Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg
2005Password authenticated key exchange using hidden smooth subgroups.
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
2005PeerAccess: a logic for distributed authorization.
Marianne Winslett, Charles C. Zhang, Piero A. Bonatti
2005Preventing attribute information leakage in automated trust negotiation.
Keith Irwin, Ting Yu
2005Preventing format-string attacks via automatic and efficient dynamic checking.
Michael F. Ringenburg, Dan Grossman
2005Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005
Vijay Atluri, Catherine Meadows, Ari Juels
2005Proxy re-signatures: new definitions, algorithms, and applications.
Giuseppe Ateniese, Susan Hohenberger
2005Secrecy types for a simulatable cryptographic library.
Peeter Laud
2005Secure collaboration in mediator-free environments.
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
2005Securing publish-subscribe overlay services with EventGuard.
Mudhakar Srivatsa, Ling Liu
2005Security market: incentives for disclosure of vulnerabilities.
Peter P. Swire
2005Tracking anonymous peer-to-peer VoIP calls on the internet.
Xinyuan Wang, Shiping Chen, Sushil Jajodia
2005Understanding and developing role-based administrative models.
Jason Crampton
2005Untraceable RFID tags via insubvertible encryption.
Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros