The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
2001 (conf/ndss/2001)

  1. Algis Rudys, John Clements, Dan S. Wallach
    Termination in Language-based Systems. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  2. Carlos Ribeiro, Andre Zuquete, Paulo Ferreira, Paulo Guedes
    SPL: An Access Control Language for Security Policies and Complex Constraints. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  3. Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar
    Efficient and Secure Source Authentication for Multicast. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  4. Philippe Golle, Nagendra Modadugu
    Authenticating Streamed Data in the Presence of Random Packet Loss. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  5. Tim Gibson
    An Architecture for Flexible, High Assurance, Multi-Security Domain Networks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  6. Pasi Eronen, Pekka Nikander
    Decentralized Jini Security. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  7. Yassir Elley, Anne H. Anderson, Steve Hanna, Sean Mullan, Radia J. Perlman, Seth Proctor
    Building Certifications Paths: Forward vs. Reverse. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  8. Alfred Menezes
    Wireless Security - Is It Real? [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  9. Drew Dean, Matthew K. Franklin, Adam Stubblefield
    An Algebraic Approach to IP Traceback. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  10. Gregory T. Byrd, Nathan Hillery, Jim Symon
    Practical Experiences with ATM Encryption. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  11. Taekyoung Kwon
    Authentication and Key Agreement Via Memorable Passwords. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  12. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust Management for IPsec. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  13. Tom Berson, Drew Dean, Matthew K. Franklin, Diana K. Smetters, Mike Spreitzer
    Cryptology As a Network Service. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  14. Steven M. Bellovin
    Security Risks Of Peer-To-Peer Networking. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  15. Giuseppe Ateniese, Breno de Medeiros, Michael T. Goodrich
    TRICERT: A Distributed Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  16. Hugh Harney, Andrea Colgrove, Patrick Drew McDaniel
    Principles of Policy in Secure Groups. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  17. Kent E. Seamons, Marianne Winslett, Ting Yu
    Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  18. Jonathan T. Trostle, Irina Kosinovsky, Michael M. Swift
    Implementation of Crossrealm Referral Handling in the MIT Kerberos Client. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002