


default search action
9th CCS 2002: Washington, DC, USA
- Vijayalakshmi Atluri:

Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002. ACM 2002, ISBN 1-58113-612-9
Cryptographic protocols
- Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre:

Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. 1-11 - Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci:

The verification of an industrial payment protocol: the SET purchase phase. 12-20 - Jan Camenisch, Els Van Herreweghen:

Design and implementation of the idemix anonymous credential system. 21-30
Key management and key exchange
- Elisa Bertino, Barbara Carminati, Elena Ferrari:

A temporal key management scheme for secure broadcasting of XML documents. 31-40 - Laurent Eschenauer, Virgil D. Gligor:

A key-management scheme for distributed sensor networks. 41-47 - William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis:

Efficient, DoS-resistant, secure key exchange for internet protocols. 48-58
Emerging applications
- Robert H. Deng

, Jianying Zhou, Feng Bao:
Defending against redirect attacks in mobile IP. 59-67 - Dan Boneh, Philippe Golle:

Almost entirely correct mixing with applications to voting. 68-77 - L. Jean Camp:

DRM: doesn't realy mean digital copyright management. 78-87
Cryptography
- Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl:

Asynchronous verifiable secret sharing and proactive cryptosystems. 88-97 - Phillip Rogaway:

Authenticated-encryption with associated-data. 98-107 - Nils Gura, Hans Eberle, Sheueling Chang Shantz:

Generic implementations of elliptic curve cryptography using partial reduction. 108-116
Network security
- Michael T. Goodrich

:
Efficient packet marking for large-scale IP traceback. 117-126 - Vishal Mittal, Giovanni Vigna:

Sensor-based intrusion detection for intra-domain distance-vector routing. 127-137 - Cliff Changchun Zou, Weibo Gong, Donald F. Towsley

:
Code red worm propagation modeling and analysis. 138-147
Authentication and authorization
- Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:

Silicon physical random functions. 148-160 - Benny Pinkas, Tomas Sander:

Securing passwords against dictionary attacks. 161-170 - Duminda Wijesekera, Sushil Jajodia:

Policy algebras for access control the predicate case. 171-180
Peer to peer networks
- Neil Daswani, Hector Garcia-Molina:

Query-flood DoS attacks in gnutella. 181-192 - Michael J. Freedman, Robert Morris:

Tarzan: a peer-to-peer anonymizing network layer. 193-206 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante:

A reputation-based approach for choosing reliable resources in peer-to-peer networks. 207-216
Analysis and verification
- Paul Ammann, Duminda Wijesekera, Saket Kaushik:

Scalable, graph-based network vulnerability analysis. 217-224 - Antony Edwards, Trent Jaeger, Xiaolan Zhang:

Runtime verification of authorization hook placement for the linux security modules framework. 225-234 - Hao Chen, David A. Wagner:

MOPS: an infrastructure for examining security properties of software. 235-244
Intrusion detection
- Peng Ning, Yun Cui, Douglas S. Reeves:

Constructing attack scenarios through correlation of intrusion alerts. 245-254 - David A. Wagner, Paolo Soto:

Mimicry attacks on host-based intrusion detection systems. 255-264 - R. Sekar, Ajay Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou:

Specification-based anomaly detection: a new approach for detecting network intrusions. 265-274

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














