Conferences in DBLP
Ohad Rodeh , Kenneth P. Birman , Danny Dolev Optimized Rekey for Group Communication Systems. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Marty Humphrey , Frederick Knabe , Adam Ferrari , Andrew S. Grimshaw Accountability and Control of Process Creation in Metasystems. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Adrian Perrig , Dawn Xiaodong Song A First Step Towards the Automatic Generation of Security Protocols. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Vitaly Shmatikov , John C. Mitchell Analysis of a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Kirsten Hildrum Security of Encrypted rlogin Connections Created With Kerberos IV. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Joseph P. Loyall , Partha Pratim Pal , Richard E. Schantz , Franklin Webber Building Adaptive and Agile Applications Using Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Ran Canetti , Pau-Chen Cheng , Frederique Giraud , Dimitrios E. Pendarakis , Josyula R. Rao , Pankaj Rohatgi , Debanjan Saha An IPSec-based Host Architecture for Secure Internet Multicast. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Peter Buhler , Thomas Eirich , Michael Waidner , Michael Steiner Secure Password-Based Cipher Suite for TLS. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Hugo Krawczyk , Tal Rabin Chameleon Signatures. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Yki Kortesniemi , Tero Hasu , Jonna Särs A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Stephen T. Kent , Charles Lynn , Joanne Mikkelson , Karen Seo Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] K. Jain , R. Sekar User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Magnus Almgren , Hervé Debar , Marc Dacier A Lightweight Tool for Detecting Web Server Attacks. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Deborah Shands , Richard Yee , Jay Jacobs , E. John Sebes Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] David Wagner , Jeffrey S. Foster , Eric A. Brewer , Alexander Aiken A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ]