Conferences in DBLP
Rakesh Agrawal Privacy cognizant information systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:1-0 [Conf ] Charlie Kaufman , Radia J. Perlman , Bill Sommerfeld DoS protection for UDP-based protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:2-7 [Conf ] William G. Morein , Angelos Stavrou , Debra L. Cook , Angelos D. Keromytis , Vishal Misra , Dan Rubenstein Using graphic turing tests to counter automated DDoS attacks against web servers. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:8-19 [Conf ] Xinyuan Wang , Douglas S. Reeves Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:20-29 [Conf ] Cheng Jin , Haining Wang , Kang G. Shin Hop-count filtering: an effective defense against spoofed DDoS traffic. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:30-41 [Conf ] Wenliang Du , Jing Deng , Yunghsiang S. Han , Pramod K. Varshney A pairwise key pre-distribution scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:42-51 [Conf ] Donggang Liu , Peng Ning Establishing pairwise keys in distributed sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:52-61 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia LEAP: efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:62-72 [Conf ] Makoto Murata , Akihiko Tozawa , Michiharu Kudo , Satoshi Hada XML access control using static analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:73-84 [Conf ] Jason Crampton On permissions, inheritance and role hierarchies. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:85-92 [Conf ] Ernesto Damiani , Sabrina De Capitani di Vimercati , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati Balancing confidentiality and efficiency in untrusted relational DBMSs. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:93-102 [Conf ] Ari Juels , Ronald L. Rivest , Michael Szydlo The blocker tag: selective blocking of RFID tags for consumer privacy. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:103-111 [Conf ] Brent R. Waters , Edward W. Felten , Amit Sahai Receiver anonymity via incomparable public keys. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:112-121 [Conf ] Luis von Ahn , Andrew Bortz , Nicholas J. Hopper k-anonymous message transmission. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:122-130 [Conf ] Eric Cronin , Sugih Jamin , Tal Malkin , Patrick Drew McDaniel On the performance, feasibility, and use of forward-secure signatures. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:131-144 [Conf ] Baoshi Zhu , Jiankang Wu , Mohan S. Kankanhalli Print signatures for document authentication. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:145-154 [Conf ] Jonathan Katz , Nan Wang Efficiency improvements for signature schemes with tight security reductions. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:155-164 [Conf ] William Aiello , John Ioannidis , Patrick Drew McDaniel Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:165-178 [Conf ] Peng Liu , Wanyu Zang Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:179-189 [Conf ] Cliff Changchun Zou , Lixin Gao , Weibo Gong , Donald F. Towsley Monitoring and early warning for internet worms. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:190-199 [Conf ] Peng Ning , Dingbang Xu Learning attack strategies from intrusion alerts. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:200-209 [Conf ] Philip D. MacKenzie , Alina Oprea , Michael K. Reiter Automatic generation of two-party computations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:210-219 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner A composable cryptographic library with nested operations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:220-230 [Conf ] Donggang Liu , Peng Ning , Kun Sun Efficient self-healing group key distribution with revocation capability. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:231-240 [Conf ] Emmanuel Bresson , Olivier Chevassut , David Pointcheval Security proofs for an efficient password-based key exchange. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:241-250 [Conf ] Christopher Krügel , Giovanni Vigna Anomaly detection of web-based attacks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:251-261 [Conf ] Robin Sommer , Vern Paxson Enhancing byte-level network intrusion detection signatures with context. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:262-271 [Conf ] Gaurav S. Kc , Angelos D. Keromytis , Vassilis Prevelakis Countering code-injection attacks with instruction-set randomization. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:272-280 [Conf ] Elena Gabriela Barrantes , David H. Ackley , Trek S. Palmer , Darko Stefanovic , Dino Dai Zovi Randomized instruction set emulation to disrupt binary code injection attacks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:281-289 [Conf ] Cullen Linn , Saumya K. Debray Obfuscation of executable code to improve resistance to static disassembly. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:290-299 [Conf ] Beverly Yang , Hector Garcia-Molina PPay: micropayments for peer-to-peer systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:300-310 [Conf ] Johannes Blömer , Martin Otto 0002 , Jean-Pierre Seifert A new CRT-RSA algorithm secure against bellcore attacks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:311-320 [Conf ] Junfeng Yang , Ted Kremenek , Yichen Xie , Dawson R. Engler MECA: an extensible, expressive system and language for statically checking security properties. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:321-334 [Conf ] David A. Basin , Sebastian Mödersheim , Luca Viganò CDiff: a new reduction technique for constraint-based analysis of security protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:335-344 [Conf ] Vinod Ganapathy , Somesh Jha , David Chandler , David Melski , David Vitek Buffer overrun detection using linear programming and static analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:345-354 [Conf ] Gene Itkis Cryptographic tamper evidence. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:355-364 [Conf ]