|
Conferences in DBLP
- Hovav Shacham, Dan Boneh
Fast-Track Session Establishment for TLS. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Adam Stubblefield, John Ioannidis, Aviel D. Rubin
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- John Ioannidis, Steven M. Bellovin
Implementing Pushback: Router-Based Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Niels Provos, Peter Honeyman
Detecting Steganographic Content on the Internet. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Peter Hesse, David Lemire
Managing Interoperability in Non-Hierarchical Public Key Infrastructures. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith
Advanced Client/Server Authentication in TLS. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Zoltán Nochta, Peter Ebinger, Sebastian Abeck
PAMINA: A Certificate Based Privilege Management System. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Gabriel Montenegro, Claude Castelluccia
Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Xuhua Ding, Daniele Mazzocchi, Gene Tsudik
Experimenting with Server-Aided Signatures. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Cristian Coarfa, Peter Druschel, Dan S. Wallach
Performance Analysis of TLS Web Servers. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Suresh Chari, Pau-Chen Cheng
BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Nikita Borisov, Eric A. Brewer
Active Certificates: A Framework for Delegation. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Christopher Krügel, Thomas Toth
Distributed Pattern Detection for Intrusion Detection. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
An Analysis of the Degradation of Anonymous Protocols. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
|