NDSS A*

16 papers

YearTitle / Authors
2000A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
David A. Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken
2000A First Step Towards the Automatic Generation of Security Protocols.
Adrian Perrig, Dawn Xiaodong Song
2000A Lightweight Tool for Detecting Web Server Attacks.
Magnus Almgren, Hervé Debar, Marc Dacier
2000A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems.
Yki Kortesniemi, Tero Hasu, Jonna Särs
2000Accountability and Control of Process Creation in Metasystems.
Marty Humphrey, Frederick Knabe, Adam Ferrari, Andrew S. Grimshaw
2000An IPSec-based Host Architecture for Secure Internet Multicast.
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha
2000Analysis of a Fair Exchange Protocol.
Vitaly Shmatikov, John C. Mitchell
2000Building Adaptive and Agile Applications Using Intrusion Detection and Response.
Joseph P. Loyall, Partha P. Pal, Richard E. Schantz, Franklin Webber
2000Chameleon Signatures.
Hugo Krawczyk, Tal Rabin
2000Optimized Rekey for Group Communication Systems.
Ohad Rodeh, Kenneth P. Birman, Danny Dolev
2000Proceedings of the Network and Distributed System Security Symposium, NDSS 2000, San Diego, California, USA
2000Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues.
Stephen T. Kent, Charles Lynn, Joanne Mikkelson, Karen Seo
2000Secure Password-Based Cipher Suite for TLS.
Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner
2000Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies.
Deborah Shands, Richard Yee, Jay Jacobs, E. John Sebes
2000Security of Encrypted rlogin Connections Created With Kerberos IV.
Kirsten Hildrum
2000User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement.
K. Jain, R. Sekar