The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
1998 (conf/ndss/1998)

  1. William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith
    Automated Recovery in a Secure Bootstrap Process. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  2. Donald E. Eastlake III
    Some Tips. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  3. Dan M. Nessett, Polar R. Humenn
    The Multilayer Firewall. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  4. B. Clifford Neuman
    Implementation Issues for E-Commerce. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  5. Howard M. Gittleson
    Lucent's Entry Into Network Security. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  6. Li Gong, Roland Schemers
    Implementing Protection Domains in the JavaTM Development Kit 1.2. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  7. Detlef Hühnlein
    Credential Management and Secure Single Login for SPKM. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  8. Phillip A. Porras, Alfonso Valdes
    Live Traffic Analysis of TCP/IP Gateways. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  9. Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
    On the Problem of Trust in Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  10. Naganand Doraswamy
    VPN and IPsec. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  11. Blair Dillaway
    Trust Management and Internet Client Security. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  12. Muriel Médard, Douglas Marquis, Stephen R. Chinn
    Attack Detection Methods for All-Optical Networks. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  13. Thomas D. Wu
    The Secure Remote Password Protocol. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  14. Mike Just
    Some Timestamping Protocol Failures. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  15. Ruth Bergman, Muriel Médard, Serena Chan
    Distributed Algorithms for Attack Localization in All-Optical Networks. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  16. Robert Blakley
    Le Nozze di Nomen. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  17. David W. Chadwick, Andrew J. Young
    Enabling the Internet White Pages Service - the Directory Guardian. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  18. Cheryl Madson
    An Intermediate System's View of IPSEC. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  19. Dan McDonald
    What Will Probably Happen. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  20. Gary McGraw
    Weak links in e-commerce security: examples from the field. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  21. Kan Zhang
    Efficient Protocols for Signing Routing Messages. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002