The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
1997 (conf/ndss/1997)

  1. Lourdes López Santidrián, Justo Carracedo Gallardo
    Hierarchical Organization of Certification Authorities for Secure Environments. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  2. G. Winfield Treese
    Panel - Security and the World Wide Web. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  3. Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-Aceves
    Securing Distance-Vector Routing Protocols. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  4. Karen E. Sirois, Stephen T. Kent
    Securing the Nimrod Routing Architecture. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  5. Marvin A. Sirbu, John C.-I. Chuang
    Distributed Authentication in Kerberos Using Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  6. Nick Ogurtsov, Hilarie K. Orman, Richard Schroeppel, Sean W. O'Malley, Oliver Spatscheck
    Experimental Results of Covert Channel Limitation in One-Way Communication Systems. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  7. Abdelaziz Mounji, Baudouin Le Charlier
    Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  8. Bryn Dole, Steven W. Lodin, Eugene H. Spafford
    Misplaced Trust: Kerberos 4 Session Keys. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  9. David M. Martin Jr., Sivaramakrishnan Rajagopalan, Aviel D. Rubin
    Blocking Java Applets at the Firewall. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  10. Stephen H. Brackin
    An Interface Specification Language for Automatically Analyzing Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  11. Steven M. Bellovin
    Probable Plaintext Cryptanalysis of the IP Security Protocols. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  12. Ralf C. Hauser, Tony Przygienda, Gene Tsudik
    Reducing the Cost of Security in Link-State Routing. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  13. Brian C. Schimpf
    Securing Web Access with DCE. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  14. Andrew J. Young, Nada Kapidzic Cicovic, David W. Chadwick
    Trust Models in ICE-TEL. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002