NDSS A*

15 papers

YearTitle / Authors
1997An Interface Specification Language for Automatically Analyzing Cryptographic Protocols.
Stephen H. Brackin
1997Blocking Java Applets at the Firewall.
David M. Martin Jr., Sivaramakrishnan Rajagopalan, Aviel D. Rubin
1997Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis.
Abdelaziz Mounji, Baudouin Le Charlier
1997Distributed Authentication in Kerberos Using Public Key Cryptography.
Marvin A. Sirbu, John C.-I. Chuang
1997Experimental Results of Covert Channel Limitation in One-Way Communication Systems.
Nick Ogurtsov, Hilarie K. Orman, Richard Schroeppel, Sean W. O'Malley, Oliver Spatscheck
1997Hierarchical Organization of Certification Authorities for Secure Environments.
Lourdes López-Santidrián, Justo Carracedo Gallardo
1997Misplaced Trust: Kerberos 4 Session Keys.
Bryn Dole, Steven W. Lodin, Eugene H. Spafford
1997Panel - Security and the World Wide Web.
G. Winfield Treese
1997Probable Plaintext Cryptanalysis of the IP Security Protocols.
Steven M. Bellovin
1997Proceedings of the Network and Distributed System Security Symposium, NDSS 1997, San Diego, California, USA
1997Reducing the Cost of Security in Link-State Routing.
Ralf C. Hauser, Tony Przygienda, Gene Tsudik
1997Securing Distance-Vector Routing Protocols.
Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-Aceves
1997Securing Web Access with DCE.
Brian C. Schimpf
1997Securing the Nimrod Routing Architecture.
Karen E. Sirois, Stephen T. Kent
1997Trust Models in ICE-TEL.
Andrew J. Young, Nada Kapidzic Cicovic, David W. Chadwick