default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2005.bht:"
@inproceedings{DBLP:conf/ccs/AbadiBEL05, author = {Mart{\'{\i}}n Abadi and Mihai Budiu and {\'{U}}lfar Erlingsson and Jay Ligatti}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Control-flow integrity}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {340--353}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102165}, doi = {10.1145/1102120.1102165}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AbadiBEL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AciicmezSK05, author = {Onur Acii{\c{c}}mez and Werner Schindler and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Improving Brumley and Boneh timing attack on unprotected {SSL} implementations}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {139--146}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102140}, doi = {10.1145/1102120.1102140}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AciicmezSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Appenzeller05, author = {Guido Appenzeller}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Identity-based encryption from algorithm to enterprise deployment}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {406}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102174}, doi = {10.1145/1102120.1102174}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Appenzeller05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtallahFB05, author = {Mikhail J. Atallah and Keith B. Frikken and Marina Blanton}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Dynamic and efficient key management for access hierarchies}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {190--202}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102147}, doi = {10.1145/1102120.1102147}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AtallahFB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseCM05, author = {Giuseppe Ateniese and Jan Camenisch and Breno de Medeiros}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Untraceable {RFID} tags via insubvertible encryption}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {92--101}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102134}, doi = {10.1145/1102120.1102134}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseCM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseH05, author = {Giuseppe Ateniese and Susan Hohenberger}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Proxy re-signatures: new definitions, algorithms, and applications}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {310--319}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102161}, doi = {10.1145/1102120.1102161}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BarakH05, author = {Boaz Barak and Shai Halevi}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {A model and architecture for pseudo-random generation with applications to /dev/random}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {203--212}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102148}, doi = {10.1145/1102120.1102148}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BarakH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Baudet05, author = {Mathieu Baudet}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Deciding security of protocols against off-line guessing attacks}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {16--25}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102125}, doi = {10.1145/1102120.1102125}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Baudet05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bjorn05, author = {Vance Bjorn}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Biometrics hit the mainstream: an analysis of security and privacy implications}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {407}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102175}, doi = {10.1145/1102120.1102175}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Bjorn05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BordersZP05, author = {Kevin Borders and Xin Zhao and Atul Prakash}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {{CPOL:} high-performance policy evaluation}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {147--157}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102142}, doi = {10.1145/1102120.1102142}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BordersZP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyenMW05, author = {Xavier Boyen and Qixiang Mei and Brent Waters}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Direct chosen ciphertext security from identity-based techniques}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {320--329}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102162}, doi = {10.1145/1102120.1102162}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyenMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Crampton05, author = {Jason Crampton}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Understanding and developing role-based administrative models}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {158--167}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102143}, doi = {10.1145/1102120.1102143}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Crampton05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CrandallSW05, author = {Jedidiah R. Crandall and Zhendong Su and Shyhtsun Felix Wu and Frederic T. Chong}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {235--248}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102152}, doi = {10.1145/1102120.1102152}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CrandallSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EnckTMP05, author = {William Enck and Patrick Traynor and Patrick D. McDaniel and Thomas F. La Porta}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Exploiting open functionality in SMS-capable cellular networks}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {393--404}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102171}, doi = {10.1145/1102120.1102171}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EnckTMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GanapathyJJ05, author = {Vinod Ganapathy and Trent Jaeger and Somesh Jha}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Automatic placement of authorization hooks in the linux security modules framework}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {330--339}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102164}, doi = {10.1145/1102120.1102164}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GanapathyJJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GentryMR05, author = {Craig Gentry and Philip D. MacKenzie and Zulfikar Ramzan}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Password authenticated key exchange using hidden smooth subgroups}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {299--309}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102160}, doi = {10.1145/1102120.1102160}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GentryMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeSDDM05, author = {Changhua He and Mukund Sundararajan and Anupam Datta and Ante Derek and John C. Mitchell}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {A modular correctness proof of {IEEE} 802.11i and {TLS}}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {2--15}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102124}, doi = {10.1145/1102120.1102124}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeSDDM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangJW05, author = {Qiang Huang and David Jao and Helen J. Wang}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Applications of secure electronic voting to automated privacy-preserving troubleshooting}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {68--80}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102132}, doi = {10.1145/1102120.1102132}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HuangJW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IrwinY05, author = {Keith Irwin and Ting Yu}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Preventing attribute information leakage in automated trust negotiation}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {36--45}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102128}, doi = {10.1145/1102120.1102128}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/IrwinY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KatzS05, author = {Jonathan Katz and Ji Sun Shin}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Modeling insider attacks on group key-exchange protocols}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {180--189}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102146}, doi = {10.1145/1102120.1102146}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KatzS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrukowNS05, author = {Karl Krukow and Mogens Nielsen and Vladimiro Sassone}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {A framework for concrete reputation-systems with applications to history-based access control}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {260--269}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102155}, doi = {10.1145/1102120.1102155}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrukowNS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Laud05, author = {Peeter Laud}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Secrecy types for a simulatable cryptographic library}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {26--35}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102126}, doi = {10.1145/1102120.1102126}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Laud05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiLW05, author = {Jiangtao Li and Ninghui Li and William H. Winsborough}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Automated trust negotiation using cryptographic credentials}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {46--57}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102129}, doi = {10.1145/1102120.1102129}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiangS05, author = {Zhenkai Liang and R. Sekar}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Fast and automated generation of attack signatures: a basis for building self-protecting servers}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {213--222}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102150}, doi = {10.1145/1102120.1102150}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiangS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Maughan05, author = {W. Douglas Maughan}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Homeland security: cyber security R{\&}D initiatives}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {1}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102122}, doi = {10.1145/1102120.1102122}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Maughan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NarayananS05, author = {Arvind Narayanan and Vitaly Shmatikov}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Obfuscated databases and group privacy}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {102--111}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102135}, doi = {10.1145/1102120.1102135}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NarayananS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NarayananS05a, author = {Arvind Narayanan and Vitaly Shmatikov}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Fast dictionary attacks on passwords using time-space tradeoff}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {364--372}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102168}, doi = {10.1145/1102120.1102168}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NarayananS05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RaimondoG05, author = {Mario Di Raimondo and Rosario Gennaro}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {New approaches for deniable authentication}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {112--121}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102137}, doi = {10.1145/1102120.1102137}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RaimondoG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RingenburgG05, author = {Michael F. Ringenburg and Dan Grossman}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Preventing format-string attacks via automatic and efficient dynamic checking}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {354--363}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102166}, doi = {10.1145/1102120.1102166}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RingenburgG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RubinCGGKWK05, author = {Shai Rubin and Mihai Christodorescu and Vinod Ganapathy and Jonathon T. Giffin and Louis Kruger and Hao Wang and Nicholas Kidd}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {An auctioning reputation system based on anomaly}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {270--279}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102156}, doi = {10.1145/1102120.1102156}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RubinCGGKWK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Seifert05, author = {Jean{-}Pierre Seifert}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {On authenticated computing and RSA-based authentication}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {122--127}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102138}, doi = {10.1145/1102120.1102138}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Seifert05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShehabBG05, author = {Mohamed Shehab and Elisa Bertino and Arif Ghafoor}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Secure collaboration in mediator-free environments}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {58--67}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102130}, doi = {10.1145/1102120.1102130}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShehabBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SherwoodBB05, author = {Rob Sherwood and Bobby Bhattacharjee and Ryan Braud}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Misbehaving {TCP} receivers can cause internet-wide congestion collapse}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {383--392}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102170}, doi = {10.1145/1102120.1102170}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SherwoodBB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SrivatsaL05, author = {Mudhakar Srivatsa and Ling Liu}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Securing publish-subscribe overlay services with EventGuard}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {289--298}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102158}, doi = {10.1145/1102120.1102158}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SrivatsaL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StavrouK05, author = {Angelos Stavrou and Angelos D. Keromytis}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Countering DoS attacks with stateless multipath overlays}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {249--259}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102153}, doi = {10.1145/1102120.1102153}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StavrouK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Swire05, author = {Peter P. Swire}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Security market: incentives for disclosure of vulnerabilities}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {405}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102173}, doi = {10.1145/1102120.1102173}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Swire05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangCJ05, author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Tracking anonymous peer-to-peer VoIP calls on the internet}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {81--91}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102133}, doi = {10.1145/1102120.1102133}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangCJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WinslettZB05, author = {Marianne Winslett and Charles C. Zhang and Piero A. Bonatti}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {PeerAccess: a logic for distributed authorization}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {168--179}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102144}, doi = {10.1145/1102120.1102144}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WinslettZB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuNKZB05, author = {Jun Xu and Peng Ning and Chongkyung Kil and Yan Zhai and Christopher Bookholt}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Automatic diagnosis and response to memory corruption vulnerabilities}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {223--234}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102151}, doi = {10.1145/1102120.1102151}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuNKZB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YurkewychLR05, author = {Matthew Yurkewych and Brian Neil Levine and Arnold L. Rosenberg}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {On the cost-ineffectiveness of redundancy in commercial {P2P} computing}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {280--288}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102157}, doi = {10.1145/1102120.1102157}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YurkewychLR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoSN05, author = {Meiyuan Zhao and Sean W. Smith and David M. Nicol}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Aggregated path authentication for efficient {BGP} security}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {128--138}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102139}, doi = {10.1145/1102120.1102139}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoSN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuangZT05, author = {Li Zhuang and Feng Zhou and J. D. Tygar}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Keyboard acoustic emanations revisited}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {373--382}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102169}, doi = {10.1145/1102120.1102169}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuangZT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2005, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-226-7}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.