The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
2000 (conf/ndss/2000)

  1. Ohad Rodeh, Kenneth P. Birman, Danny Dolev
    Optimized Rekey for Group Communication Systems. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  2. Marty Humphrey, Frederick Knabe, Adam Ferrari, Andrew S. Grimshaw
    Accountability and Control of Process Creation in Metasystems. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  3. Adrian Perrig, Dawn Xiaodong Song
    A First Step Towards the Automatic Generation of Security Protocols. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  4. Vitaly Shmatikov, John C. Mitchell
    Analysis of a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  5. Kirsten Hildrum
    Security of Encrypted rlogin Connections Created With Kerberos IV. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  6. Joseph P. Loyall, Partha Pratim Pal, Richard E. Schantz, Franklin Webber
    Building Adaptive and Agile Applications Using Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  7. Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha
    An IPSec-based Host Architecture for Secure Internet Multicast. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  8. Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner
    Secure Password-Based Cipher Suite for TLS. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  9. Hugo Krawczyk, Tal Rabin
    Chameleon Signatures. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  10. Yki Kortesniemi, Tero Hasu, Jonna Särs
    A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  11. Stephen T. Kent, Charles Lynn, Joanne Mikkelson, Karen Seo
    Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  12. K. Jain, R. Sekar
    User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  13. Magnus Almgren, Hervé Debar, Marc Dacier
    A Lightweight Tool for Detecting Web Server Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  14. Deborah Shands, Richard Yee, Jay Jacobs, E. John Sebes
    Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  15. David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002