Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acsac/acsac2000.bht:"
@inproceedings{DBLP:conf/acsac/Al-MuhtadiAMC00, author = {Jalal Al{-}Muhtadi and Manish Anand and M. Dennis Mickunas and Roy H. Campbell}, title = {Secure Smart Homes using Jini and {UIUC} {SESAME}}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {77}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898860}, doi = {10.1109/ACSAC.2000.898860}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Al-MuhtadiAMC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AydosYK00, author = {Murat Aydos and Tugrul Yanik and {\c{C}}etin Kaya Ko{\c{c}}}, title = {An High-Speed ECC-based Wireless Authentication Protocol on an {ARM} Microprocessor}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {401--410}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898895}, doi = {10.1109/ACSAC.2000.898895}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AydosYK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Bao00, author = {Feng Bao}, title = {Introducing Decryption Authority into {PKI}}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {288}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898883}, doi = {10.1109/ACSAC.2000.898883}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Bao00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BarkaS00, author = {Ezedin Barka and Ravi S. Sandhu}, title = {Framework for Role-based Delegation Models}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {168}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898870}, doi = {10.1109/ACSAC.2000.898870}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BarkaS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BieberRS00, author = {Pierre Bieber and D. Raujol and Pierre Siron}, title = {Security Architecture for Federated Cooperative Information Systems}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {208--216}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898875}, doi = {10.1109/ACSAC.2000.898875}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BieberRS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BrownL00, author = {Ian Brown and B. Laurie}, title = {Security Against Compelled Disclosure}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {2--10}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898852}, doi = {10.1109/ACSAC.2000.898852}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BrownL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BruschiCR00, author = {Danilo Bruschi and Lorenzo Cavallaro and Emilia Rosti}, title = {Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {188--195}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898872}, doi = {10.1109/ACSAC.2000.898872}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BruschiCR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CaroniKSS00, author = {Germano Caronni and Sandeep Kumar and Christoph L. Schuba and Glenn Scott}, title = {Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {42--51}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898856}, doi = {10.1109/ACSAC.2000.898856}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CaroniKSS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ClarkMV00, author = {P. C. Clark and M. C. Meissner and K. O. Vance}, title = {Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {217--223}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898876}, doi = {10.1109/ACSAC.2000.898876}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ClarkMV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CorradiMSLS00, author = {Antonio Corradi and Rebecca Montanari and Cesare Stefanelli and Emil Lupu and Morris Sloman}, title = {A Flexible Access Control Service for Java Mobile Code}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {356--365}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898890}, doi = {10.1109/ACSAC.2000.898890}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CorradiMSLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DanielsS00, author = {Thomas E. Daniels and Eugene H. Spafford}, title = {A Network Audit System for Host-based Intrusion Detection {(NASHID)} in Linux}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {178--187}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898871}, doi = {10.1109/ACSAC.2000.898871}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DanielsS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DoshiFJM00, author = {Vinti Doshi and Amgad Fayad and Sushil Jajodia and Roswitha MacLean}, title = {Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {298--307}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898884}, doi = {10.1109/ACSAC.2000.898884}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DoshiFJM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EpsteinTM00, author = {Jeremy Epstein and L. Thomas and Eric Monteith}, title = {Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {236--245}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898878}, doi = {10.1109/ACSAC.2000.898878}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EpsteinTM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FaldellaP00, author = {Eugenio Faldella and Marco Prandini}, title = {A Novel Approach to On-Line Status Authentication of Public-Key Certificates}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {270--277}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898881}, doi = {10.1109/ACSAC.2000.898881}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FaldellaP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FreudenthalHW00, author = {Margus Freudenthal and Sven Heiberg and Jan Willemson}, title = {Personal Security Environment on Palm {PDA}}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {366--372}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898891}, doi = {10.1109/ACSAC.2000.898891}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FreudenthalHW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaliassoBHSFH00, author = {Pablo Galiasso and Oliver Bremer and John Hale and Sujeet Shenoi and David F. Ferraiolo and Vincent C. Hu}, title = {Policy Mediation for Multi-Enterprise Environments}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {100--106}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898863}, doi = {10.1109/ACSAC.2000.898863}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GaliassoBHSFH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Grossschadl00, author = {Johann Gro{\ss}sch{\"{a}}dl}, title = {The Chinese Remainder Theorem and its Application in a High-Speed {RSA} Crypto Chip}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {384--393}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898893}, doi = {10.1109/ACSAC.2000.898893}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Grossschadl00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Gutmann00, author = {Peter Gutmann}, title = {A Reliable, Scalable General-Purpose Certificate Store}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {278--287}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898882}, doi = {10.1109/ACSAC.2000.898882}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Gutmann00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HalePBCS00, author = {John Hale and Mauricio Papa and Oliver Bremer and Rodrigo Chandia and Sujeet Shenoi}, title = {Extending Java for Package based Access Control}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {67--76}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898859}, doi = {10.1109/ACSAC.2000.898859}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HalePBCS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Hayes00, author = {Jeff Hayes}, title = {Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {328--333}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898887}, doi = {10.1109/ACSAC.2000.898887}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Hayes00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuangRWD00, author = {Xunhua Wang and Yih Huang and Yvo Desmedt and David Rine}, title = {Enabling Secure On-Line {DNS} Dynamic Update}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {52}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898857}, doi = {10.1109/ACSAC.2000.898857}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HuangRWD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JangK00, author = {Heejin Jang and Sangwook Kim}, title = {A Self-Extension Monitoring for Security Management}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {196}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898873}, doi = {10.1109/ACSAC.2000.898873}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JangK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JendrickeM00, author = {Uwe Jendricke and Daniela Gerd tom Markotten}, title = {Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {344}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898889}, doi = {10.1109/ACSAC.2000.898889}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JendrickeM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JohnsonB00, author = {Dale M. Johnson and Lee A. Benzinger}, title = {Layering Boundary Protections: An Experiment in Information Assurance}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {60--66}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898858}, doi = {10.1109/ACSAC.2000.898858}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JohnsonB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Knorr00, author = {Konstantin Knorr}, title = {Dynamic Access Control through Petri Net Workflows}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {159--167}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898869}, doi = {10.1109/ACSAC.2000.898869}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Knorr00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MichaelG00, author = {Christoph C. Michael and Anup K. Ghosh}, title = {Two State-based Approaches to Program-based Anomaly Detection}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {21}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898854}, doi = {10.1109/ACSAC.2000.898854}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MichaelG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PalsbergKKMSZ00, author = {Jens Palsberg and S. Krishnaswamy and Minseok Kwon and Di Ma and Qiuyun Shao and Y. Zhang}, title = {Experience with Software Watermarking}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {308--316}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898885}, doi = {10.1109/ACSAC.2000.898885}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PalsbergKKMSZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ParkS00, author = {Joon S. Park and Ravi S. Sandhu}, title = {Binding Identities and Attributes using Digitally Signed Certificates}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {120--127}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898865}, doi = {10.1109/ACSAC.2000.898865}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ParkS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ParkSS00, author = {Jaehong Park and Ravi S. Sandhu and J. Schifalacqua}, title = {Security Architectures for Controlled Digital Information Dissemination}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {224}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898877}, doi = {10.1109/ACSAC.2000.898877}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ParkSS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PetkacB00, author = {Michael J. Petkac and Lee Badger}, title = {Security Agility in Response to Intrusion Detection}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898853}, doi = {10.1109/ACSAC.2000.898853}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PetkacB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PrasadPABLD00, author = {Vishwa Prasad and Sreenivasa Potakamuri and Michael Ahern and Igor Balabine and Michah Lerner and Partha Dutta}, title = {Scalable Policy Driven and General Purpose Public Key Infrastructure {(PKI)}}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {138}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898867}, doi = {10.1109/ACSAC.2000.898867}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PrasadPABLD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RannenbergI00, author = {Kai Rannenberg and Giovanni Iachello}, title = {Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {107}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898864}, doi = {10.1109/ACSAC.2000.898864}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RannenbergI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SailerK00, author = {Reiner Sailer and Matthias Kabatnik}, title = {History-based Distributed Filtering - {A} Tagging Approach to Network-Level Access Control}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {373}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898892}, doi = {10.1109/ACSAC.2000.898892}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SailerK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SantosK00, author = {Andr{\'{e}} L. M. dos Santos and Richard A. Kemmerer}, title = {Implementing Security Policies using the Safe Areas of Computation Approach}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {90--99}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898862}, doi = {10.1109/ACSAC.2000.898862}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SantosK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchneiderF00, author = {Michael A. Schneider and Edward W. Felten}, title = {Efficient Commerce Protocols based on One-Time Pads}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {317}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898886}, doi = {10.1109/ACSAC.2000.898886}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchneiderF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SpyropoulouLI00, author = {E. Spyropoulou and Timothy E. Levin and Cynthia E. Irvine}, title = {Calculating Costs for Quality of Security Service}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {334--343}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898888}, doi = {10.1109/ACSAC.2000.898888}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SpyropoulouLI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Strother00, author = {E. Strother}, title = {Denial of Service Protection - The Nozzle}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {32--41}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898855}, doi = {10.1109/ACSAC.2000.898855}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Strother00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/UngureanuVM00, author = {Victoria Ungureanu and F. Vesuna and Naftaly H. Minsky}, title = {A Policy-based Access Control Mechanism for the Corporate Web}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {150--158}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898868}, doi = {10.1109/ACSAC.2000.898868}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/UngureanuVM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ViegaBKM00, author = {John Viega and J. T. Bloch and Y. Kohno and Gary McGraw}, title = {{ITS4:} {A} Static Vulnerability Scanner for {C} and {C++} Code}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {257}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898880}, doi = {10.1109/ACSAC.2000.898880}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ViegaBKM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangKE00, author = {Chenxi Wang and John C. Knight and Matthew C. Elder}, title = {On Computer Viral Infection and the Effect of Immunization}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {246--256}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898879}, doi = {10.1109/ACSAC.2000.898879}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangKE00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WohlmacherP00, author = {Petra Wohlmacher and Peter Pharow}, title = {Applications in Health Care using Public-Key Certificates and Attribute Certificates}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {128--137}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898866}, doi = {10.1109/ACSAC.2000.898866}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WohlmacherP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhaoVM00, author = {Weiliang Zhao and Vijay Varadharajan and Yi Mu}, title = {Fair On-line Gambling}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {394--400}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898894}, doi = {10.1109/ACSAC.2000.898894}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhaoVM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2000, title = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://ieeexplore.ieee.org/xpl/conhome/7224/proceeding}, isbn = {0-7695-0859-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.