The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
2004 (conf/ndss/2004)

  1. Olatunji Ruwase, Monica S. Lam
    A Practical Dynamic Buffer Overflow Detector. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  2. Vinod Yegneswaran, Paul Barford, Somesh Jha
    Global Intrusion Detection in the DOMINO Overlay System. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  3. Jiang Wu, Sarma Vangala, Lixin Gao, Kevin A. Kwiat
    An Effective Architecture and Algorithm for Detecting Worms with Various Scan. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  4. Brent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters
    Building an Encrypted and Searchable Audit Log. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  5. Lingxuan Hu, David Evans
    Using Directional Antennas to Prevent Wormhole Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  6. Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant
    Building Attack Scenarios through Integration of Complementary Alert Correlation Method. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  7. Jonathon T. Giffin, Somesh Jha, Barton P. Miller
    Efficient Context-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  8. Tal Garfinkel, Ben Pfaff, Mendel Rosenblum
    Ostia: A Delegating Architecture for Secure System Call Interposition. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  9. Einar Mykletun, Maithili Narasimha, Gene Tsudik
    Authentication and Integrity in Outsourced Databases. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  10. Nagendra Modadugu, Eric Rescorla
    The Design and Implementation of Datagram TLS. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  11. Neil Chou, Robert Ledesma, Yuka Teraguchi, John C. Mitchell
    Client-Side Defense Against Web-Based Identity Theft. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  12. Hao Chen, Drew Dean, David Wagner
    Model Checking One Million Lines of C Code. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  13. Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar
    Distillation Codes and Applications to DoS Resistant Multicast Authentication. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  14. Vipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang Shantz, Nils Gura, Hans Eberle
    Speeding up Secure Web Transactions Using Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  15. Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, Santosh S. Venkatesh
    DoS Protection for Reliably Authenticated Broadcast. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  16. Tom Yu, Sam Hartman, Kenneth Raeburn
    The Perils of Unauthenticated Encryption: Kerberos Version 4. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002