|
Conferences in DBLP
- William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith
Automated Recovery in a Secure Bootstrap Process. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Donald E. Eastlake III
Some Tips. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Dan M. Nessett, Polar R. Humenn
The Multilayer Firewall. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- B. Clifford Neuman
Implementation Issues for E-Commerce. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Howard M. Gittleson
Lucent's Entry Into Network Security. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Li Gong, Roland Schemers
Implementing Protection Domains in the JavaTM Development Kit 1.2. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Detlef Hühnlein
Credential Management and Secure Single Login for SPKM. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Phillip A. Porras, Alfonso Valdes
Live Traffic Analysis of TCP/IP Gateways. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
On the Problem of Trust in Mobile Agent Systems. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Naganand Doraswamy
VPN and IPsec. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Blair Dillaway
Trust Management and Internet Client Security. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Muriel Médard, Douglas Marquis, Stephen R. Chinn
Attack Detection Methods for All-Optical Networks. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Thomas D. Wu
The Secure Remote Password Protocol. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Mike Just
Some Timestamping Protocol Failures. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Ruth Bergman, Muriel Médard, Serena Chan
Distributed Algorithms for Attack Localization in All-Optical Networks. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Robert Blakley
Le Nozze di Nomen. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- David W. Chadwick, Andrew J. Young
Enabling the Internet White Pages Service - the Directory Guardian. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Cheryl Madson
An Intermediate System's View of IPSEC. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Dan McDonald
What Will Probably Happen. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Gary McGraw
Weak links in e-commerce security: examples from the field. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Kan Zhang
Efficient Protocols for Signing Routing Messages. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
|