The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
2003 (conf/ndss/2003)

  1. Martín Abadi, Michael Burrows, Ted Wobber
    Moderately Hard, Memory-Bound Functions. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  2. Anca-Andreea Ivan, Yevgeniy Dodis
    Proxy Cryptography Revisited. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  3. Brennen Reynolds, Dipak Ghosal
    Secure IP Telephony using Multi-layered Protection. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  4. John Ioannidis
    Fighting Spam by Encapsulating Policy in Email Addresses. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  5. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Efficient Security Mechanisms for Routing Protocolsa. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  6. Alain Pannetrat, Refik Molva
    Efficient Multicast Packet Authentication. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  7. Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh
    SiRiUS: Securing Remote Untrusted Storage. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  8. Pekka Nikander, Jukka Ylitalo, Jorma Wall
    Integrating Security, Mobility and Multi-Homing in a HIP Way. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  9. Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis, David Mazières
    Proactive Two-Party Signatures for User Authentication. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  10. Tal Garfinkel, Mendel Rosenblum
    A Virtual Machine Introspection Based Architecture for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  11. Tal Garfinkel
    Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  12. Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin
    Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  13. Donggang Liu, Peng Ning
    Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  14. Eric Haugh, Matt Bishop
    Testing C Programs for Buffer Overflow Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  15. Ahsan Habib, Mohamed Hefeeda, Bharat K. Bhargava
    Detecting Service Violations and DoS Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  16. Martín Abadi, Cédric Fournet
    Access Control Based on Execution History. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  17. John Wilander, Mariam Kamkar
    A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002