NDSS A*

17 papers

YearTitle / Authors
2004A Practical Dynamic Buffer Overflow Detector.
Olatunji Ruwase, Monica S. Lam
2004An Effective Architecture and Algorithm for Detecting Worms with Various Scan.
Jiang Wu, Sarma Vangala, Lixin Gao, Kevin A. Kwiat
2004Authentication and Integrity in Outsourced Databases.
Einar Mykletun, Maithili Narasimha, Gene Tsudik
2004Building Attack Scenarios through Integration of Complementary Alert Correlation Method.
Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant
2004Building an Encrypted and Searchable Audit Log.
Brent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters
2004Client-Side Defense Against Web-Based Identity Theft.
Neil Chou, Robert Ledesma, Yuka Teraguchi, John C. Mitchell
2004Distillation Codes and Applications to DoS Resistant Multicast Authentication.
Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar
2004DoS Protection for Reliably Authenticated Broadcast.
Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, Santosh S. Venkatesh
2004Efficient Context-Sensitive Intrusion Detection.
Jonathon T. Giffin, Somesh Jha, Barton P. Miller
2004Global Intrusion Detection in the DOMINO Overlay System.
Vinod Yegneswaran, Paul Barford, Somesh Jha
2004Model Checking One Million Lines of C Code.
Hao Chen, Drew Dean, David A. Wagner
2004Ostia: A Delegating Architecture for Secure System Call Interposition.
Tal Garfinkel, Ben Pfaff, Mendel Rosenblum
2004Proceedings of the Network and Distributed System Security Symposium, NDSS 2004, San Diego, California, USA
2004Speeding up Secure Web Transactions Using Elliptic Curve Cryptography.
Vipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang Shantz, Nils Gura, Hans Eberle
2004The Design and Implementation of Datagram TLS.
Nagendra Modadugu, Eric Rescorla
2004The Perils of Unauthenticated Encryption: Kerberos Version 4.
Tom Yu, Sam Hartman, Kenneth Raeburn
2004Using Directional Antennas to Prevent Wormhole Attacks.
Lingxuan Hu, David Evans