The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2002 (conf/ccs/2002)

  1. Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
    Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:1-11 [Conf]
  2. Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci
    The verification of an industrial payment protocol: the SET purchase phase. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:12-20 [Conf]
  3. Jan Camenisch, Els Van Herreweghen
    Design and implementation of the idemix anonymous credential system. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:21-30 [Conf]
  4. Elisa Bertino, Barbara Carminati, Elena Ferrari
    A temporal key management scheme for secure broadcasting of XML documents. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:31-40 [Conf]
  5. Laurent Eschenauer, Virgil D. Gligor
    A key-management scheme for distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:41-47 [Conf]
  6. William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis
    Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf]
  7. Robert H. Deng, Jianying Zhou, Feng Bao
    Defending against redirect attacks in mobile IP. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:59-67 [Conf]
  8. Dan Boneh, Philippe Golle
    Almost entirely correct mixing with applications to voting. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:68-77 [Conf]
  9. L. Jean Camp
    DRM: doesn't realy mean digital copyright management. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:78-87 [Conf]
  10. Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
    Asynchronous verifiable secret sharing and proactive cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:88-97 [Conf]
  11. Phillip Rogaway
    Authenticated-encryption with associated-data. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:98-107 [Conf]
  12. Nils Gura, Hans Eberle, Sheueling Chang Shantz
    Generic implementations of elliptic curve cryptography using partial reduction. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:108-116 [Conf]
  13. Michael T. Goodrich
    Efficient packet marking for large-scale IP traceback. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:117-126 [Conf]
  14. Vishal Mittal, Giovanni Vigna
    Sensor-based intrusion detection for intra-domain distance-vector routing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:127-137 [Conf]
  15. Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
    Code red worm propagation modeling and analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:138-147 [Conf]
  16. Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas
    Silicon physical random functions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:148-160 [Conf]
  17. Benny Pinkas, Tomas Sander
    Securing passwords against dictionary attacks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:161-170 [Conf]
  18. Duminda Wijesekera, Sushil Jajodia
    Policy algebras for access control the predicate case. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:171-180 [Conf]
  19. Neil Daswani, Hector Garcia-Molina
    Query-flood DoS attacks in gnutella. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:181-192 [Conf]
  20. Michael J. Freedman, Robert Morris
    Tarzan: a peer-to-peer anonymizing network layer. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:193-206 [Conf]
  21. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante
    A reputation-based approach for choosing reliable resources in peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:207-216 [Conf]
  22. Paul Ammann, Duminda Wijesekera, Saket Kaushik
    Scalable, graph-based network vulnerability analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:217-224 [Conf]
  23. Antony Edwards, Trent Jaeger, Xiaolan Zhang
    Runtime verification of authorization hook placement for the linux security modules framework. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:225-234 [Conf]
  24. Hao Chen, David Wagner
    MOPS: an infrastructure for examining security properties of software. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:235-244 [Conf]
  25. Peng Ning, Yun Cui, Douglas S. Reeves
    Constructing attack scenarios through correlation of intrusion alerts. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:245-254 [Conf]
  26. David Wagner, Paolo Soto
    Mimicry attacks on host-based intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:255-264 [Conf]
  27. R. Sekar, Ajay Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou
    Specification-based anomaly detection: a new approach for detecting network intrusions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:265-274 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002