|
Conferences in DBLP
- Olatunji Ruwase, Monica S. Lam
A Practical Dynamic Buffer Overflow Detector. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Vinod Yegneswaran, Paul Barford, Somesh Jha
Global Intrusion Detection in the DOMINO Overlay System. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Jiang Wu, Sarma Vangala, Lixin Gao, Kevin A. Kwiat
An Effective Architecture and Algorithm for Detecting Worms with Various Scan. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Brent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters
Building an Encrypted and Searchable Audit Log. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Lingxuan Hu, David Evans
Using Directional Antennas to Prevent Wormhole Attacks. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant
Building Attack Scenarios through Integration of Complementary Alert Correlation Method. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Jonathon T. Giffin, Somesh Jha, Barton P. Miller
Efficient Context-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Tal Garfinkel, Ben Pfaff, Mendel Rosenblum
Ostia: A Delegating Architecture for Secure System Call Interposition. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Einar Mykletun, Maithili Narasimha, Gene Tsudik
Authentication and Integrity in Outsourced Databases. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Nagendra Modadugu, Eric Rescorla
The Design and Implementation of Datagram TLS. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Neil Chou, Robert Ledesma, Yuka Teraguchi, John C. Mitchell
Client-Side Defense Against Web-Based Identity Theft. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Hao Chen, Drew Dean, David Wagner
Model Checking One Million Lines of C Code. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar
Distillation Codes and Applications to DoS Resistant Multicast Authentication. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Vipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang Shantz, Nils Gura, Hans Eberle
Speeding up Secure Web Transactions Using Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, Santosh S. Venkatesh
DoS Protection for Reliably Authenticated Broadcast. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Tom Yu, Sam Hartman, Kenneth Raeburn
The Perils of Unauthenticated Encryption: Kerberos Version 4. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
|