The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
1999 (conf/ndss/1999)

  1. Andreu Riera, Joan Borrell
    Practical Approach to Anonymity in Large Scale Electronic Voting Schemes. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  2. Fabian Monrose, Peter Wyckoff, Aviel D. Rubin
    Distributed Execution with Remote Audit. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  3. Sandra L. Murphy
    BGP Vulnerabilities and Security Options. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  4. Pekka Nikander, Jonna Partanen
    Distributed Policy Management for JDK 1.2. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  5. Christian Gilmore, David P. Kormann, Aviel D. Rubin
    Secure Remote Access to an Internal Web Server. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  6. Hilarie K. Orman
    Perspectives on Progress and Directions for Network Security Research. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  7. Radia J. Perlman, Charlie Kaufman
    Secure Password-Based Protocol for Downloading a Private Key. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  8. Rodney Thayer
    Benefits of IPsec. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  9. Curtis Villamizer
    Improving Internet Routing Robustness. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  10. Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli, Pierangela Samarati
    PGRIP: PNNI Global Routing Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  11. Michael Malkin, Thomas D. Wu, Dan Boneh
    Experimenting with Shared Generation of RSA Keys. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  12. Charles Lynn
    Secure Border Gateway Protocol (S-BGP). [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  13. Thomas D. Wu
    A Real-World Analysis of Kerberos Password Security. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  14. Mark Ackerman
    Usability and Security. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  15. Audun Jøsang
    An Algebra for Assessing Trust in Certification Chains. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  16. Ari Juels, John G. Brainard
    Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  17. Mike Just, Paul C. van Oorschot
    Addressing the Problem of Undetected Signature Key Compromise. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  18. Steven M. Bellovin
    Why Do We Need More Research? [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  19. Steven M. Bellovin
    Transport-Friendly ESP. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  20. Stephen T. Kent
    R&D Challenges: Notes from the "Trust in Cyberspace" Report. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  21. Bob Braden
    Arguments Against IPSEC. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  22. Tony Li
    BGP Origin Authentication. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  23. Mary Ellen Zurko
    User-Centered Security. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002