Conferences in DBLP
Mihir Bellare , Tadayoshi Kohno , Chanathip Namprempre Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:1-11 [Conf ] Giampaolo Bella , Lawrence C. Paulson , Fabio Massacci The verification of an industrial payment protocol: the SET purchase phase. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:12-20 [Conf ] Jan Camenisch , Els Van Herreweghen Design and implementation of the idemix anonymous credential system. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:21-30 [Conf ] Elisa Bertino , Barbara Carminati , Elena Ferrari A temporal key management scheme for secure broadcasting of XML documents. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:31-40 [Conf ] Laurent Eschenauer , Virgil D. Gligor A key-management scheme for distributed sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:41-47 [Conf ] William Aiello , Steven M. Bellovin , Matt Blaze , John Ioannidis , Omer Reingold , Ran Canetti , Angelos D. Keromytis Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf ] Robert H. Deng , Jianying Zhou , Feng Bao Defending against redirect attacks in mobile IP. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:59-67 [Conf ] Dan Boneh , Philippe Golle Almost entirely correct mixing with applications to voting. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:68-77 [Conf ] L. Jean Camp DRM: doesn't realy mean digital copyright management. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:78-87 [Conf ] Christian Cachin , Klaus Kursawe , Anna Lysyanskaya , Reto Strobl Asynchronous verifiable secret sharing and proactive cryptosystems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:88-97 [Conf ] Phillip Rogaway Authenticated-encryption with associated-data. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:98-107 [Conf ] Nils Gura , Hans Eberle , Sheueling Chang Shantz Generic implementations of elliptic curve cryptography using partial reduction. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:108-116 [Conf ] Michael T. Goodrich Efficient packet marking for large-scale IP traceback. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:117-126 [Conf ] Vishal Mittal , Giovanni Vigna Sensor-based intrusion detection for intra-domain distance-vector routing. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:127-137 [Conf ] Cliff Changchun Zou , Weibo Gong , Donald F. Towsley Code red worm propagation modeling and analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:138-147 [Conf ] Blaise Gassend , Dwaine E. Clarke , Marten van Dijk , Srinivas Devadas Silicon physical random functions. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:148-160 [Conf ] Benny Pinkas , Tomas Sander Securing passwords against dictionary attacks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:161-170 [Conf ] Duminda Wijesekera , Sushil Jajodia Policy algebras for access control the predicate case. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:171-180 [Conf ] Neil Daswani , Hector Garcia-Molina Query-flood DoS attacks in gnutella. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:181-192 [Conf ] Michael J. Freedman , Robert Morris Tarzan: a peer-to-peer anonymizing network layer. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:193-206 [Conf ] Ernesto Damiani , Sabrina De Capitani di Vimercati , Stefano Paraboschi , Pierangela Samarati , Fabio Violante A reputation-based approach for choosing reliable resources in peer-to-peer networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:207-216 [Conf ] Paul Ammann , Duminda Wijesekera , Saket Kaushik Scalable, graph-based network vulnerability analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:217-224 [Conf ] Antony Edwards , Trent Jaeger , Xiaolan Zhang Runtime verification of authorization hook placement for the linux security modules framework. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:225-234 [Conf ] Hao Chen , David Wagner MOPS: an infrastructure for examining security properties of software. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:235-244 [Conf ] Peng Ning , Yun Cui , Douglas S. Reeves Constructing attack scenarios through correlation of intrusion alerts. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:245-254 [Conf ] David Wagner , Paolo Soto Mimicry attacks on host-based intrusion detection systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:255-264 [Conf ] R. Sekar , Ajay Gupta , J. Frullo , T. Shanbhag , A. Tiwari , H. Yang , S. Zhou Specification-based anomaly detection: a new approach for detecting network intrusions. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:265-274 [Conf ]