The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2003 (conf/ccs/2003)

  1. Rakesh Agrawal
    Privacy cognizant information systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:1-0 [Conf]
  2. Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
    DoS protection for UDP-based protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:2-7 [Conf]
  3. William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
    Using graphic turing tests to counter automated DDoS attacks against web servers. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:8-19 [Conf]
  4. Xinyuan Wang, Douglas S. Reeves
    Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:20-29 [Conf]
  5. Cheng Jin, Haining Wang, Kang G. Shin
    Hop-count filtering: an effective defense against spoofed DDoS traffic. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:30-41 [Conf]
  6. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
    A pairwise key pre-distribution scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:42-51 [Conf]
  7. Donggang Liu, Peng Ning
    Establishing pairwise keys in distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:52-61 [Conf]
  8. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    LEAP: efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:62-72 [Conf]
  9. Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada
    XML access control using static analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:73-84 [Conf]
  10. Jason Crampton
    On permissions, inheritance and role hierarchies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:85-92 [Conf]
  11. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Balancing confidentiality and efficiency in untrusted relational DBMSs. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:93-102 [Conf]
  12. Ari Juels, Ronald L. Rivest, Michael Szydlo
    The blocker tag: selective blocking of RFID tags for consumer privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:103-111 [Conf]
  13. Brent R. Waters, Edward W. Felten, Amit Sahai
    Receiver anonymity via incomparable public keys. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:112-121 [Conf]
  14. Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
    k-anonymous message transmission. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:122-130 [Conf]
  15. Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew McDaniel
    On the performance, feasibility, and use of forward-secure signatures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:131-144 [Conf]
  16. Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli
    Print signatures for document authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:145-154 [Conf]
  17. Jonathan Katz, Nan Wang
    Efficiency improvements for signature schemes with tight security reductions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:155-164 [Conf]
  18. William Aiello, John Ioannidis, Patrick Drew McDaniel
    Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:165-178 [Conf]
  19. Peng Liu, Wanyu Zang
    Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:179-189 [Conf]
  20. Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley
    Monitoring and early warning for internet worms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:190-199 [Conf]
  21. Peng Ning, Dingbang Xu
    Learning attack strategies from intrusion alerts. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:200-209 [Conf]
  22. Philip D. MacKenzie, Alina Oprea, Michael K. Reiter
    Automatic generation of two-party computations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:210-219 [Conf]
  23. Michael Backes, Birgit Pfitzmann, Michael Waidner
    A composable cryptographic library with nested operations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:220-230 [Conf]
  24. Donggang Liu, Peng Ning, Kun Sun
    Efficient self-healing group key distribution with revocation capability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:231-240 [Conf]
  25. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Security proofs for an efficient password-based key exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:241-250 [Conf]
  26. Christopher Krügel, Giovanni Vigna
    Anomaly detection of web-based attacks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:251-261 [Conf]
  27. Robin Sommer, Vern Paxson
    Enhancing byte-level network intrusion detection signatures with context. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:262-271 [Conf]
  28. Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis
    Countering code-injection attacks with instruction-set randomization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:272-280 [Conf]
  29. Elena Gabriela Barrantes, David H. Ackley, Trek S. Palmer, Darko Stefanovic, Dino Dai Zovi
    Randomized instruction set emulation to disrupt binary code injection attacks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:281-289 [Conf]
  30. Cullen Linn, Saumya K. Debray
    Obfuscation of executable code to improve resistance to static disassembly. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:290-299 [Conf]
  31. Beverly Yang, Hector Garcia-Molina
    PPay: micropayments for peer-to-peer systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:300-310 [Conf]
  32. Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert
    A new CRT-RSA algorithm secure against bellcore attacks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:311-320 [Conf]
  33. Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler
    MECA: an extensible, expressive system and language for statically checking security properties. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:321-334 [Conf]
  34. David A. Basin, Sebastian Mödersheim, Luca Viganò
    CDiff: a new reduction technique for constraint-based analysis of security protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:335-344 [Conf]
  35. Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek
    Buffer overrun detection using linear programming and static analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:345-354 [Conf]
  36. Gene Itkis
    Cryptographic tamper evidence. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:355-364 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002