USENIX Security Symposium A*

21 papers

YearTitle / Authors
20009th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000
Steven M. Bellovin, Greg Rose
2000A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols.
Jonathan Katz, Bruce Schneier
2000A Multi-Layer IPSEC Protocol.
Yongguang Zhang, Bikramjit Singh
2000A Secure Java Virtual Machine.
Leendert van Doorn
2000An Open-Source Cryptographic Coprocessor.
Peter Gutmann
2000Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor.
John Scott Robin, Cynthia E. Irvine
2000Automated Response Using System-Call Delay.
Anil Somayaji, Stephanie Forrest
2000Can Pseudonymity Really Guarantee Privacy?
Josyula R. Rao, Pankaj Rohatgi
2000CenterTrack: An IP Overlay Network for Tracking DoS Floods.
Robert Stone
2000Defeating TCP/IP Stack Fingerprinting.
Matthew Smart, G. Robert Malan, Farnam Jahanian
2000Deja Vu-A User Study: Using Images for Authentication.
Rachna Dhamija, Adrian Perrig
2000Detecting Backdoors.
Yin Zhang, Vern Paxson
2000Detecting Stepping Stones.
Yin Zhang, Vern Paxson
2000Detecting and Countering System Intrusions Using Software Wrappers.
Calvin Ko, Timothy Fraser, Lee Badger, Douglas Kilpatrickv
2000Encrypting Virtual Memory.
Niels Provos
2000MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications.
Anurag Acharya, Mandar Raje
2000PGP in Constrained Wireless Devices.
Michael Brown, Donny Cheung, Darrel Hankerson, Julio César López-Hernández, Michael Kirkup, Alfred Menezes
2000Probabilistic Counting of Large Digital Signature Collections.
Markus G. Kuhn
2000Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System.
Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor
2000Secure Coprocessor Integration with Kerberos V5.
Naomaru Itoi
2000Shibboleth: Private Mailing List Manager.
Matt Curtin