Search dblp for Publications

export results for "toc:db/conf/ccs/ccs2002.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/AielloBBIRCK02,
  author       = {William Aiello and
                  Steven M. Bellovin and
                  Matt Blaze and
                  John Ioannidis and
                  Omer Reingold and
                  Ran Canetti and
                  Angelos D. Keromytis},
  editor       = {Vijayalakshmi Atluri},
  title        = {Efficient, DoS-resistant, secure key exchange for internet protocols},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {48--58},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586118},
  doi          = {10.1145/586110.586118},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AielloBBIRCK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AmmannWK02,
  author       = {Paul Ammann and
                  Duminda Wijesekera and
                  Saket Kaushik},
  editor       = {Vijayalakshmi Atluri},
  title        = {Scalable, graph-based network vulnerability analysis},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {217--224},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586140},
  doi          = {10.1145/586110.586140},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AmmannWK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellaPM02,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson and
                  Fabio Massacci},
  editor       = {Vijayalakshmi Atluri},
  title        = {The verification of an industrial payment protocol: the {SET} purchase
                  phase},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {12--20},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586113},
  doi          = {10.1145/586110.586113},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellaPM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareKN02,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Chanathip Namprempre},
  editor       = {Vijayalakshmi Atluri},
  title        = {Authenticated encryption in {SSH:} provably fixing the {SSH} binary
                  packet protocol},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586112},
  doi          = {10.1145/586110.586112},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareKN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BertinoCF02,
  author       = {Elisa Bertino and
                  Barbara Carminati and
                  Elena Ferrari},
  editor       = {Vijayalakshmi Atluri},
  title        = {A temporal key management scheme for secure broadcasting of {XML}
                  documents},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586116},
  doi          = {10.1145/586110.586116},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BertinoCF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehG02,
  author       = {Dan Boneh and
                  Philippe Golle},
  editor       = {Vijayalakshmi Atluri},
  title        = {Almost entirely correct mixing with applications to voting},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {68--77},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586121},
  doi          = {10.1145/586110.586121},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BonehG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CachinKLS02,
  author       = {Christian Cachin and
                  Klaus Kursawe and
                  Anna Lysyanskaya and
                  Reto Strobl},
  editor       = {Vijayalakshmi Atluri},
  title        = {Asynchronous verifiable secret sharing and proactive cryptosystems},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {88--97},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586124},
  doi          = {10.1145/586110.586124},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CachinKLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischH02,
  author       = {Jan Camenisch and
                  Els Van Herreweghen},
  editor       = {Vijayalakshmi Atluri},
  title        = {Design and implementation of the \emph{idemix} anonymous credential
                  system},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586114},
  doi          = {10.1145/586110.586114},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CamenischH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Camp02,
  author       = {L. Jean Camp},
  editor       = {Vijayalakshmi Atluri},
  title        = {{DRM:} doesn't realy mean digital copyright management},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {78--87},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586122},
  doi          = {10.1145/586110.586122},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Camp02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenW02,
  author       = {Hao Chen and
                  David A. Wagner},
  editor       = {Vijayalakshmi Atluri},
  title        = {{MOPS:} an infrastructure for examining security properties of software},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {235--244},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586142},
  doi          = {10.1145/586110.586142},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DamianiVPSV02,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Stefano Paraboschi and
                  Pierangela Samarati and
                  Fabio Violante},
  editor       = {Vijayalakshmi Atluri},
  title        = {A reputation-based approach for choosing reliable resources in peer-to-peer
                  networks},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {207--216},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586138},
  doi          = {10.1145/586110.586138},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DamianiVPSV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DaswaniG02,
  author       = {Neil Daswani and
                  Hector Garcia{-}Molina},
  editor       = {Vijayalakshmi Atluri},
  title        = {Query-flood DoS attacks in gnutella},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {181--192},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586136},
  doi          = {10.1145/586110.586136},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DaswaniG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DengZB02,
  author       = {Robert H. Deng and
                  Jianying Zhou and
                  Feng Bao},
  editor       = {Vijayalakshmi Atluri},
  title        = {Defending against redirect attacks in mobile {IP}},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {59--67},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586120},
  doi          = {10.1145/586110.586120},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DengZB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EdwardsJZ02,
  author       = {Antony Edwards and
                  Trent Jaeger and
                  Xiaolan Zhang},
  editor       = {Vijayalakshmi Atluri},
  title        = {Runtime verification of authorization hook placement for the linux
                  security modules framework},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {225--234},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586141},
  doi          = {10.1145/586110.586141},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EdwardsJZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EschenauerG02,
  author       = {Laurent Eschenauer and
                  Virgil D. Gligor},
  editor       = {Vijayalakshmi Atluri},
  title        = {A key-management scheme for distributed sensor networks},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {41--47},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586117},
  doi          = {10.1145/586110.586117},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EschenauerG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FreedmanM02,
  author       = {Michael J. Freedman and
                  Robert Tappan Morris},
  editor       = {Vijayalakshmi Atluri},
  title        = {Tarzan: a peer-to-peer anonymizing network layer},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {193--206},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586137},
  doi          = {10.1145/586110.586137},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FreedmanM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GassendCDD02,
  author       = {Blaise Gassend and
                  Dwaine E. Clarke and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Vijayalakshmi Atluri},
  title        = {Silicon physical random functions},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {148--160},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586132},
  doi          = {10.1145/586110.586132},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GassendCDD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Goodrich02,
  author       = {Michael T. Goodrich},
  editor       = {Vijayalakshmi Atluri},
  title        = {Efficient packet marking for large-scale {IP} traceback},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {117--126},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586128},
  doi          = {10.1145/586110.586128},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Goodrich02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuraES02,
  author       = {Nils Gura and
                  Hans Eberle and
                  Sheueling Chang Shantz},
  editor       = {Vijayalakshmi Atluri},
  title        = {Generic implementations of elliptic curve cryptography using partial
                  reduction},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {108--116},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586126},
  doi          = {10.1145/586110.586126},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuraES02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MittalV02,
  author       = {Vishal Mittal and
                  Giovanni Vigna},
  editor       = {Vijayalakshmi Atluri},
  title        = {Sensor-based intrusion detection for intra-domain distance-vector
                  routing},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {127--137},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586129},
  doi          = {10.1145/586110.586129},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MittalV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NingCR02,
  author       = {Peng Ning and
                  Yun Cui and
                  Douglas S. Reeves},
  editor       = {Vijayalakshmi Atluri},
  title        = {Constructing attack scenarios through correlation of intrusion alerts},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586144},
  doi          = {10.1145/586110.586144},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NingCR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PinkasS02,
  author       = {Benny Pinkas and
                  Tomas Sander},
  editor       = {Vijayalakshmi Atluri},
  title        = {Securing passwords against dictionary attacks},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {161--170},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586133},
  doi          = {10.1145/586110.586133},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PinkasS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Rogaway02,
  author       = {Phillip Rogaway},
  editor       = {Vijayalakshmi Atluri},
  title        = {Authenticated-encryption with associated-data},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {98--107},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586125},
  doi          = {10.1145/586110.586125},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Rogaway02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SekarGFSTYZ02,
  author       = {R. Sekar and
                  Ajay Gupta and
                  J. Frullo and
                  T. Shanbhag and
                  A. Tiwari and
                  H. Yang and
                  S. Zhou},
  editor       = {Vijayalakshmi Atluri},
  title        = {Specification-based anomaly detection: a new approach for detecting
                  network intrusions},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {265--274},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586146},
  doi          = {10.1145/586110.586146},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SekarGFSTYZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WagnerS02,
  author       = {David A. Wagner and
                  Paolo Soto},
  editor       = {Vijayalakshmi Atluri},
  title        = {Mimicry attacks on host-based intrusion detection systems},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {255--264},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586145},
  doi          = {10.1145/586110.586145},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WagnerS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WijesekeraJ02,
  author       = {Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Vijayalakshmi Atluri},
  title        = {Policy algebras for access control the predicate case},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {171--180},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586134},
  doi          = {10.1145/586110.586134},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WijesekeraJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZouGT02,
  author       = {Cliff Changchun Zou and
                  Weibo Gong and
                  Donald F. Towsley},
  editor       = {Vijayalakshmi Atluri},
  title        = {Code red worm propagation modeling and analysis},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {138--147},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586130},
  doi          = {10.1145/586110.586130},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZouGT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2002,
  editor       = {Vijayalakshmi Atluri},
  title        = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {http://dl.acm.org/citation.cfm?id=586110},
  isbn         = {1-58113-612-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics