|
Conferences in DBLP
- Andreu Riera, Joan Borrell
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Fabian Monrose, Peter Wyckoff, Aviel D. Rubin
Distributed Execution with Remote Audit. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Sandra L. Murphy
BGP Vulnerabilities and Security Options. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Pekka Nikander, Jonna Partanen
Distributed Policy Management for JDK 1.2. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Christian Gilmore, David P. Kormann, Aviel D. Rubin
Secure Remote Access to an Internal Web Server. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Hilarie K. Orman
Perspectives on Progress and Directions for Network Security Research. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Radia J. Perlman, Charlie Kaufman
Secure Password-Based Protocol for Downloading a Private Key. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Rodney Thayer
Benefits of IPsec. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Curtis Villamizer
Improving Internet Routing Robustness. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli, Pierangela Samarati
PGRIP: PNNI Global Routing Infrastructure Protection. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Michael Malkin, Thomas D. Wu, Dan Boneh
Experimenting with Shared Generation of RSA Keys. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Charles Lynn
Secure Border Gateway Protocol (S-BGP). [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Thomas D. Wu
A Real-World Analysis of Kerberos Password Security. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Mark Ackerman
Usability and Security. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Audun Jøsang
An Algebra for Assessing Trust in Certification Chains. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Ari Juels, John G. Brainard
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Mike Just, Paul C. van Oorschot
Addressing the Problem of Undetected Signature Key Compromise. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Steven M. Bellovin
Why Do We Need More Research? [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Steven M. Bellovin
Transport-Friendly ESP. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Stephen T. Kent
R&D Challenges: Notes from the "Trust in Cyberspace" Report. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Bob Braden
Arguments Against IPSEC. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Tony Li
BGP Origin Authentication. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Mary Ellen Zurko
User-Centered Security. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
|