default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2003.bht:"
@inproceedings{DBLP:conf/ccs/Agrawal03, author = {Rakesh Agrawal}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Privacy cognizant information systems}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {1}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948111}, doi = {10.1145/948109.948111}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Agrawal03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhnBH03, author = {Luis von Ahn and Andrew Bortz and Nicholas J. Hopper}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {k-anonymous message transmission}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {122--130}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948128}, doi = {10.1145/948109.948128}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AhnBH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AielloIM03, author = {William Aiello and John Ioannidis and Patrick D. McDaniel}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Origin authentication in interdomain routing}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {165--178}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948133}, doi = {10.1145/948109.948133}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AielloIM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesPW03, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {A composable cryptographic library with nested operations}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {220--230}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948140}, doi = {10.1145/948109.948140}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BackesPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BarrantesAPSZ03, author = {Elena Gabriela Barrantes and David H. Ackley and Trek S. Palmer and Darko Stefanovic and Dino Dai Zovi}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Randomized instruction set emulation to disrupt binary code injection attacks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {281--289}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948147}, doi = {10.1145/948109.948147}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BarrantesAPSZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinMV03, author = {David A. Basin and Sebastian M{\"{o}}dersheim and Luca Vigan{\`{o}}}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {CDiff: a new reduction technique for constraint-based analysis of security protocols}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {335--344}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948154}, doi = {10.1145/948109.948154}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BasinMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlomerOS03, author = {Johannes Bl{\"{o}}mer and Martin Otto and Jean{-}Pierre Seifert}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {A new {CRT-RSA} algorithm secure against bellcore attacks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {311--320}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948151}, doi = {10.1145/948109.948151}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlomerOS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BressonCP03, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Security proofs for an efficient password-based key exchange}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {241--250}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948142}, doi = {10.1145/948109.948142}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BressonCP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Crampton03, author = {Jason Crampton}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {On permissions, inheritance and role hierarchies}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {85--92}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948123}, doi = {10.1145/948109.948123}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Crampton03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CroninJMM03, author = {Eric Cronin and Sugih Jamin and Tal Malkin and Patrick D. McDaniel}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {On the performance, feasibility, and use of forward-secure signatures}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {131--144}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948130}, doi = {10.1145/948109.948130}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CroninJMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DamianiVJPS03, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Balancing confidentiality and efficiency in untrusted relational DBMSs}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {93--102}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948124}, doi = {10.1145/948109.948124}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DamianiVJPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuDHV03, author = {Wenliang Du and Jing Deng and Yunghsiang S. Han and Pramod K. Varshney}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {A pairwise key pre-distribution scheme for wireless sensor networks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {42--51}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948118}, doi = {10.1145/948109.948118}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DuDHV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GanapathyJCMV03, author = {Vinod Ganapathy and Somesh Jha and David Chandler and David Melski and David Vitek}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Buffer overrun detection using linear programming and static analysis}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {345--354}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948155}, doi = {10.1145/948109.948155}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GanapathyJCMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Itkis03, author = {Gene Itkis}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Cryptographic tamper evidence}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {355--364}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948156}, doi = {10.1145/948109.948156}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Itkis03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JinWS03, author = {Cheng Jin and Haining Wang and Kang G. Shin}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Hop-count filtering: an effective defense against spoofed DDoS traffic}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {30--41}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948116}, doi = {10.1145/948109.948116}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JinWS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsRS03, author = {Ari Juels and Ronald L. Rivest and Michael Szydlo}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {The blocker tag: selective blocking of {RFID} tags for consumer privacy}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {103--111}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948126}, doi = {10.1145/948109.948126}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KatzW03, author = {Jonathan Katz and Nan Wang}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Efficiency improvements for signature schemes with tight security reductions}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {155--164}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948132}, doi = {10.1145/948109.948132}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KatzW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KaufmanPS03, author = {Charlie Kaufman and Radia J. Perlman and Bill Sommerfeld}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {DoS protection for UDP-based protocols}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {2--7}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948113}, doi = {10.1145/948109.948113}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KaufmanPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KcKP03, author = {Gaurav S. Kc and Angelos D. Keromytis and Vassilis Prevelakis}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Countering code-injection attacks with instruction-set randomization}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {272--280}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948146}, doi = {10.1145/948109.948146}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KcKP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrugelV03, author = {Christopher Kr{\"{u}}gel and Giovanni Vigna}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Anomaly detection of web-based attacks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {251--261}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948144}, doi = {10.1145/948109.948144}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrugelV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LinnD03, author = {Cullen Linn and Saumya K. Debray}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Obfuscation of executable code to improve resistance to static disassembly}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {290--299}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948149}, doi = {10.1145/948109.948149}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LinnD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuN03, author = {Donggang Liu and Peng Ning}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Establishing pairwise keys in distributed sensor networks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {52--61}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948119}, doi = {10.1145/948109.948119}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuNS03, author = {Donggang Liu and Peng Ning and Kun Sun}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Efficient self-healing group key distribution with revocation capability}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {231--240}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948141}, doi = {10.1145/948109.948141}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuNS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuZ03, author = {Peng Liu and Wanyu Zang}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Incentive-based modeling and inference of attacker intent, objectives, and strategies}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {179--189}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948135}, doi = {10.1145/948109.948135}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MacKenzieOR03, author = {Philip D. MacKenzie and Alina Oprea and Michael K. Reiter}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Automatic generation of two-party computations}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {210--219}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948139}, doi = {10.1145/948109.948139}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MacKenzieOR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoreinSCKMR03, author = {William G. Morein and Angelos Stavrou and Debra L. Cook and Angelos D. Keromytis and Vishal Misra and Dan Rubenstein}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Using graphic turing tests to counter automated DDoS attacks against web servers}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {8--19}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948114}, doi = {10.1145/948109.948114}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoreinSCKMR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MurataTKH03, author = {Makoto Murata and Akihiko Tozawa and Michiharu Kudo and Satoshi Hada}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {{XML} access control using static analysis}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {73--84}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948122}, doi = {10.1145/948109.948122}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MurataTKH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NingX03, author = {Peng Ning and Dingbang Xu}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Learning attack strategies from intrusion alerts}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {200--209}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948137}, doi = {10.1145/948109.948137}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NingX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SommerP03, author = {Robin Sommer and Vern Paxson}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Enhancing byte-level network intrusion detection signatures with context}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {262--271}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948145}, doi = {10.1145/948109.948145}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SommerP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangR03, author = {Xinyuan Wang and Douglas S. Reeves}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {20--29}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948115}, doi = {10.1145/948109.948115}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WatersFS03, author = {Brent R. Waters and Edward W. Felten and Amit Sahai}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Receiver anonymity via incomparable public keys}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {112--121}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948127}, doi = {10.1145/948109.948127}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WatersFS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangG03, author = {Beverly Yang and Hector Garcia{-}Molina}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {PPay: micropayments for peer-to-peer systems}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {300--310}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948150}, doi = {10.1145/948109.948150}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangKXE03, author = {Junfeng Yang and Ted Kremenek and Yichen Xie and Dawson R. Engler}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {{MECA:} an extensible, expressive system and language for statically checking security properties}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {321--334}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948153}, doi = {10.1145/948109.948153}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangKXE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {{LEAP:} efficient security mechanisms for large-scale distributed sensor networks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {62--72}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948120}, doi = {10.1145/948109.948120}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuWK03, author = {Baoshi Zhu and Jiankang Wu and Mohan S. Kankanhalli}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Print signatures for document authentication}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {145--154}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948131}, doi = {10.1145/948109.948131}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuWK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZouGGT03, author = {Cliff Changchun Zou and Lixin Gao and Weibo Gong and Donald F. Towsley}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Monitoring and early warning for internet worms}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {190--199}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948136}, doi = {10.1145/948109.948136}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZouGGT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2003, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, publisher = {{ACM}}, year = {2003}, url = {http://dl.acm.org/citation.cfm?id=948109}, isbn = {1-58113-738-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.