The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2004 (conf/ccs/2004ccs)

  1. John D. McLean
    Trusting a trusted system. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:1- [Conf]
  2. Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer
    Operational experiences with high-volume network intrusion detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:2-11 [Conf]
  3. Kirill Levchenko, Ramamohan Paturi, George Varghese
    On the difficulty of scalably detecting network attacks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:12-20 [Conf]
  4. Giovanni Vigna, William K. Robertson, Davide Balzarotti
    Testing network-based intrusion detection signatures using mutant exploits. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:21-30 [Conf]
  5. Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon
    Payload attribution via hierarchical bloom filters. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:31-41 [Conf]
  6. Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara
    On mutually-exclusive roles and separation of duty. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:42-51 [Conf]
  7. Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
    KNOW Why your access was denied: regulating feedback for usable security. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:52-61 [Conf]
  8. Mahesh V. Tripunitara, Ninghui Li
    Comparing the expressive power of access control models. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:62-71 [Conf]
  9. Tadayoshi Kohno
    Attacking and repairing the winZip encryption scheme. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:72-81 [Conf]
  10. Xavier Boyen
    Reusable cryptographic fuzzy extractors. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:82-91 [Conf]
  11. David Wagner
    Cryptanalysis of a provably secure CRT-RSA algorithm. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:92-97 [Conf]
  12. Neil Daswani, Hector Garcia-Molina
    Pong-cache poisoning in GUESS. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:98-109 [Conf]
  13. Kevin Borders, Atul Prakash
    Web tap: detecting covert web traffic. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:110-120 [Conf]
  14. Adam J. O'Donnell, Harish Sethu
    On achieving software diversity for improved network security using distributed coloring algorithms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:121-131 [Conf]
  15. Ernest F. Brickell, Jan Camenisch, Liqun Chen
    Direct anonymous attestation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:132-145 [Conf]
  16. Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
    Concealing complex policies with hidden credentials. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:146-157 [Conf]
  17. Shouhuai Xu, Moti Yung
    k-anonymous secret handshakes with reusable credentials. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:158-167 [Conf]
  18. Dan Boneh, Hovav Shacham
    Group signatures with verifier-local revocation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:168-177 [Conf]
  19. Serdar Cabuk, Carla E. Brodley, Clay Shields
    IP covert timing channels: design and detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:178-187 [Conf]
  20. David P. Woodruff, Jessica Staddon
    Private inference control. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:188-197 [Conf]
  21. Stephen Chong, Andrew C. Myers
    Security policies for downgrading. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:198-209 [Conf]
  22. David Molnar, David Wagner
    Privacy and security in library RFID: issues, practices, and architectures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:210-219 [Conf]
  23. Philippe Golle, Ari Juels
    Parallel mixing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:220-226 [Conf]
  24. Michael K. Reiter, XiaoFeng Wang
    Fragile mixing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:227-235 [Conf]
  25. Volker Roth, Kai Richter, Rene Freidinger
    A PIN-entry method resilient against shoulder surfing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:236-245 [Conf]
  26. Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten
    New client puzzle outsourcing techniques for DoS resistance. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:246-256 [Conf]
  27. XiaoFeng Wang, Michael K. Reiter
    Mitigating bandwidth-exhaustion attacks using congestion puzzles. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:257-267 [Conf]
  28. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
    Verifying policy-based security for web services. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:268-277 [Conf]
  29. Stéphanie Delaune, Florent Jacquemard
    A decision procedure for the verification of security protocols with explicit destructors. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:278-287 [Conf]
  30. Hao Chen, Jonathan S. Shapiro
    Using build-integrated static checking to preserve correctness invariants. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:288-297 [Conf]
  31. Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh
    On the effectiveness of address-space randomization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:298-307 [Conf]
  32. Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn
    Attestation-based policy enforcement for remote access. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:308-317 [Conf]
  33. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    Gray-box extraction of execution graphs for anomaly detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:318-329 [Conf]
  34. Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung
    The dual receiver cryptosystem and its applications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:330-343 [Conf]
  35. Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
    Versatile padding schemes for joint signature and encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:344-353 [Conf]
  36. Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
    ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:354-363 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002