USENIX Security Symposium A*

14 papers

YearTitle / Authors
1996A Framework for Building an Electronic Currency System.
Lei Tang
1996A Revocable Backup System.
Dan Boneh, Richard J. Lipton
1996A Secure Environment for Untrusted Helper Applications.
Ian Goldberg, David A. Wagner, Randi Thomas, Eric A. Brewer
1996Building Systems That Flexibly Download Executable Content.
Trent Jaeger, Atul Prakash
1996Chrg-http: A Tool for Micropayments on the World Wide Web.
Steven H. Low
1996Compliance Defects in Public Key Cryptography.
Don Davis
1996Confining Root Programs with Domain and Type Enforcement.
Kenneth M. Walker, Daniel F. Sterne, Lee Badger, Michael J. Petkac, David L. Sherman, Karen A. Oostendorp
1996Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks.
Barry Jaspan
1996Murphy's Law and Computer Security.
Wietse Z. Venema
1996NetKuang - A Multi-Host Configuration Vulnerability Checker.
Dan Zerkle, Karl N. Levitt
1996Problem Areas for the IP Security Protocols.
Steven M. Bellovin
1996Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996
1996Public Key Distribution with Secure DNS.
James M. Galvin
1996Texas A&M University Anarchistic Key Authorization (AKA).
David Safford, Douglas Lee Schales, David K. Hess