The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
2002 (conf/ndss/2002)

  1. Hovav Shacham, Dan Boneh
    Fast-Track Session Establishment for TLS. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  2. Adam Stubblefield, John Ioannidis, Aviel D. Rubin
    Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  3. John Ioannidis, Steven M. Bellovin
    Implementing Pushback: Router-Based Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  4. Niels Provos, Peter Honeyman
    Detecting Steganographic Content on the Internet. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  5. Peter Hesse, David Lemire
    Managing Interoperability in Non-Hierarchical Public Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  6. Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith
    Advanced Client/Server Authentication in TLS. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  7. Zoltán Nochta, Peter Ebinger, Sebastian Abeck
    PAMINA: A Certificate Based Privilege Management System. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  8. Gabriel Montenegro, Claude Castelluccia
    Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  9. Xuhua Ding, Daniele Mazzocchi, Gene Tsudik
    Experimenting with Server-Aided Signatures. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  10. Cristian Coarfa, Peter Druschel, Dan S. Wallach
    Performance Analysis of TLS Web Servers. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  11. Suresh Chari, Pau-Chen Cheng
    BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  12. Nikita Borisov, Eric A. Brewer
    Active Certificates: A Framework for Delegation. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  13. Christopher Krügel, Thomas Toth
    Distributed Pattern Detection for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  14. Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong
    Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  15. Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
    An Analysis of the Degradation of Anonymous Protocols. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002