The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2005 (conf/ccs/2005)

  1. W. Douglas Maughan
    Homeland security: cyber security R&D initiatives. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:1- [Conf]
  2. Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell
    A modular correctness proof of IEEE 802.11i and TLS. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:2-15 [Conf]
  3. Mathieu Baudet
    Deciding security of protocols against off-line guessing attacks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:16-25 [Conf]
  4. Peeter Laud
    Secrecy types for a simulatable cryptographic library. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:26-35 [Conf]
  5. Keith Irwin, Ting Yu
    Preventing attribute information leakage in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:36-45 [Conf]
  6. Jiangtao Li, Ninghui Li, William H. Winsborough
    Automated trust negotiation using cryptographic credentials. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:46-57 [Conf]
  7. Mohamed Shehab, Elisa Bertino, Arif Ghafoor
    Secure collaboration in mediator-free environments. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:58-67 [Conf]
  8. Qiang Huang, David Jao, Helen J. Wang
    Applications of secure electronic voting to automated privacy-preserving troubleshooting. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:68-80 [Conf]
  9. Xinyuan Wang, Shiping Chen, Sushil Jajodia
    Tracking anonymous peer-to-peer VoIP calls on the internet. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:81-91 [Conf]
  10. Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros
    Untraceable RFID tags via insubvertible encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:92-101 [Conf]
  11. Arvind Narayanan, Vitaly Shmatikov
    Obfuscated databases and group privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:102-111 [Conf]
  12. Mario Di Raimondo, Rosario Gennaro
    New approaches for deniable authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:112-121 [Conf]
  13. Jean-Pierre Seifert
    On authenticated computing and RSA-based authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:122-127 [Conf]
  14. Meiyuan Zhao, Sean W. Smith, David M. Nicol
    Aggregated path authentication for efficient BGP security. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:128-138 [Conf]
  15. Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
    Improving Brumley and Boneh timing attack on unprotected SSL implementations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:139-146 [Conf]
  16. Kevin Borders, Xin Zhao, Atul Prakash
    CPOL: high-performance policy evaluation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:147-157 [Conf]
  17. Jason Crampton
    Understanding and developing role-based administrative models. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:158-167 [Conf]
  18. Marianne Winslett, Charles C. Zhang, Piero A. Bonatti
    PeerAccess: a logic for distributed authorization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:168-179 [Conf]
  19. Jonathan Katz, Ji Sun Shin
    Modeling insider attacks on group key-exchange protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:180-189 [Conf]
  20. Mikhail J. Atallah, Keith B. Frikken, Marina Blanton
    Dynamic and efficient key management for access hierarchies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:190-202 [Conf]
  21. Boaz Barak, Shai Halevi
    A model and architecture for pseudo-random generation with applications to /dev/random. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:203-212 [Conf]
  22. Zhenkai Liang, R. Sekar
    Fast and automated generation of attack signatures: a basis for building self-protecting servers. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:213-222 [Conf]
  23. Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt
    Automatic diagnosis and response to memory corruption vulnerabilities. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:223-234 [Conf]
  24. Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong
    On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:235-248 [Conf]
  25. Angelos Stavrou, Angelos D. Keromytis
    Countering DoS attacks with stateless multipath overlays. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:249-259 [Conf]
  26. Karl Krukow, Mogens Nielsen, Vladimiro Sassone
    A framework for concrete reputation-systems with applications to history-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:260-269 [Conf]
  27. Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd
    An auctioning reputation system based on anomaly. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:270-279 [Conf]
  28. Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg
    On the cost-ineffectiveness of redundancy in commercial P2P computing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:280-288 [Conf]
  29. Mudhakar Srivatsa, Ling Liu
    Securing publish-subscribe overlay services with EventGuard. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:289-298 [Conf]
  30. Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
    Password authenticated key exchange using hidden smooth subgroups. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:299-309 [Conf]
  31. Giuseppe Ateniese, Susan Hohenberger
    Proxy re-signatures: new definitions, algorithms, and applications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:310-319 [Conf]
  32. Xavier Boyen, Qixiang Mei, Brent Waters
    Direct chosen ciphertext security from identity-based techniques. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:320-329 [Conf]
  33. Vinod Ganapathy, Trent Jaeger, Somesh Jha
    Automatic placement of authorization hooks in the linux security modules framework. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:330-339 [Conf]
  34. Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
    Control-flow integrity. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:340-353 [Conf]
  35. Michael F. Ringenburg, Dan Grossman
    Preventing format-string attacks via automatic and efficient dynamic checking. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:354-363 [Conf]
  36. Arvind Narayanan, Vitaly Shmatikov
    Fast dictionary attacks on passwords using time-space tradeoff. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:364-372 [Conf]
  37. Li Zhuang, Feng Zhou, J. D. Tygar
    Keyboard acoustic emanations revisited. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:373-382 [Conf]
  38. Rob Sherwood, Bobby Bhattacharjee, Ryan Braud
    Misbehaving TCP receivers can cause internet-wide congestion collapse. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:383-392 [Conf]
  39. William Enck, Patrick Traynor, Patrick McDaniel, Thomas F. La Porta
    Exploiting open functionality in SMS-capable cellular networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:393-404 [Conf]
  40. Peter P. Swire
    Security market: incentives for disclosure of vulnerabilities. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:405- [Conf]
  41. Guido Appenzeller
    Identity-based encryption from algorithm to enterprise deployment. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:406- [Conf]
  42. Vance Bjorn
    Biometrics hit the mainstream: an analysis of security and privacy implications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:407- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002