default search action
NDSS 2005: San Diego, California, USA
- Proceedings of the Network and Distributed System Security Symposium, NDSS 2005, San Diego, California, USA. The Internet Society 2005, ISBN 1-891562-20-7
Cryptography in Network Security
- Alina Oprea, Michael K. Reiter:
Space-Efficient Block Storage Integrity. - Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. - Sandeep S. Kulkarni, Bezawada Bruhadeshwar:
Rekeying and Storage Cost for Multiple User Revocation.
Denial of Service Attacks
- Xiapu Luo, Rocky K. C. Chang:
On a New Class of Pulsing Denial-of-Service Attacks and the Defense. - Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein:
MOVE: An End-to-End Solution to Network Denial of Service. - Changhua He, John C. Mitchell:
Security Analysis and Improvements for IEEE 802.11i.
Peer-to-Peer Approaches
- Qiang Huang, Helen J. Wang, Nikita Borisov:
Privacy-Preserving Friends Troubleshooting Network. - Tao Wan, Evangelos Kranakis, Paul C. van Oorschot:
Pretty Secure BGP, psBGP.
Internet Defense
- Shobha Venkataraman, Dawn Xiaodong Song, Phillip B. Gibbons, Avrim Blum:
New Streaming Algorithms for Fast Detection of Superspreaders. - Michael D. Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario:
The Internet Motion Sensor - A Distributed Blackhole Monitoring System. - David Whyte, Evangelos Kranakis, Paul C. van Oorschot:
DNS-based Detection of Scanning Worms in an Enterprise Network.
Intrusion Detection
- Alexey Smirnov, Tzi-cker Chiueh:
DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks. - James Newsome, Dawn Xiaodong Song:
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. - Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, Peter M. Chen:
Enriching Intrusion Alerts Through Multi-Host Causality.
Platform Security
- Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang:
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. - Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar:
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.