default search action
9th CCS 2002: Washington, DC, USA
- Vijayalakshmi Atluri:
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002. ACM 2002, ISBN 1-58113-612-9
Cryptographic protocols
- Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre:
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. 1-11 - Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci:
The verification of an industrial payment protocol: the SET purchase phase. 12-20 - Jan Camenisch, Els Van Herreweghen:
Design and implementation of the idemix anonymous credential system. 21-30
Key management and key exchange
- Elisa Bertino, Barbara Carminati, Elena Ferrari:
A temporal key management scheme for secure broadcasting of XML documents. 31-40 - Laurent Eschenauer, Virgil D. Gligor:
A key-management scheme for distributed sensor networks. 41-47 - William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis:
Efficient, DoS-resistant, secure key exchange for internet protocols. 48-58
Emerging applications
- Robert H. Deng, Jianying Zhou, Feng Bao:
Defending against redirect attacks in mobile IP. 59-67 - Dan Boneh, Philippe Golle:
Almost entirely correct mixing with applications to voting. 68-77 - L. Jean Camp:
DRM: doesn't realy mean digital copyright management. 78-87
Cryptography
- Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl:
Asynchronous verifiable secret sharing and proactive cryptosystems. 88-97 - Phillip Rogaway:
Authenticated-encryption with associated-data. 98-107 - Nils Gura, Hans Eberle, Sheueling Chang Shantz:
Generic implementations of elliptic curve cryptography using partial reduction. 108-116
Network security
- Michael T. Goodrich:
Efficient packet marking for large-scale IP traceback. 117-126 - Vishal Mittal, Giovanni Vigna:
Sensor-based intrusion detection for intra-domain distance-vector routing. 127-137 - Cliff Changchun Zou, Weibo Gong, Donald F. Towsley:
Code red worm propagation modeling and analysis. 138-147
Authentication and authorization
- Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
Silicon physical random functions. 148-160 - Benny Pinkas, Tomas Sander:
Securing passwords against dictionary attacks. 161-170 - Duminda Wijesekera, Sushil Jajodia:
Policy algebras for access control the predicate case. 171-180
Peer to peer networks
- Neil Daswani, Hector Garcia-Molina:
Query-flood DoS attacks in gnutella. 181-192 - Michael J. Freedman, Robert Tappan Morris:
Tarzan: a peer-to-peer anonymizing network layer. 193-206 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante:
A reputation-based approach for choosing reliable resources in peer-to-peer networks. 207-216
Analysis and verification
- Paul Ammann, Duminda Wijesekera, Saket Kaushik:
Scalable, graph-based network vulnerability analysis. 217-224 - Antony Edwards, Trent Jaeger, Xiaolan Zhang:
Runtime verification of authorization hook placement for the linux security modules framework. 225-234 - Hao Chen, David A. Wagner:
MOPS: an infrastructure for examining security properties of software. 235-244
Intrusion detection
- Peng Ning, Yun Cui, Douglas S. Reeves:
Constructing attack scenarios through correlation of intrusion alerts. 245-254 - David A. Wagner, Paolo Soto:
Mimicry attacks on host-based intrusion detection systems. 255-264 - R. Sekar, Ajay Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou:
Specification-based anomaly detection: a new approach for detecting network intrusions. 265-274
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.