![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
7th USENIX Security Symposium 1998: San Antonio, TX, USA
- Aviel D. Rubin:
Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA, January 26-29, 1998. USENIX Association 1998 - Kobbi Nissim, Moni Naor:
Certificate Revocation and Certificate Update. - Raph Levien, Alex Aiken:
Attack-Resistant Trust Metrics for Public Key Certification. - Peter Gutmann:
Software Generation of Practically Strong Random Numbers. - Annette Krannig:
Towards Web Security Using PLASMA. - Vinod Anupam, Alain J. Mayer:
Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. - John C. Mitchell, Vitaly Shmatikov, Ulrich Stern:
Finite-State Analysis of SSL 3.0. - Victoria Ungureanu, Naftaly H. Minsky:
Unified Support for Heterogeneous Security Policies in Distributed Systems. - Trent Jaeger, Jochen Liedtke, Nayeem Islam:
Operating System Protection for Fine-Grained Programs. - Karen R. Sollins, Nimisha V. Mehta:
Expanding and Extending the Security Features of Java. - Carsten Benecke, Uwe Ellermann:
Securing Classical IP Over ATM Networks. - Pekka Nikander, Arto Karila:
A Java Beans Component Architecture for Cryptographic Protocols. - Peter Honeyman, Andy Adamson, Kevin Coffman, Janani Janakiraman, Rob Jerdonek, Jim Rees:
Secure Videoconferencing. - Vern Paxson:
Bro: A System for Detecting Network Intruders in Real-Time. - Bruce Schneier, John Kelsey:
Cryptographic Support for Secure Logs on Untrusted Machines. - Crispan Cowan:
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. - Wenke Lee, Salvatore J. Stolfo:
Data Mining Approaches for Intrusion Detection. - Brian Loe, Michael Carney:
A Comparison of Methods for Implementing Adaptive Security Policies. - Eshwar Belani, Amin Vahdat, Thomas E. Anderson, Michael Dahlin:
The CRISIS Wide Area Security Architecture.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.