Conferences in DBLP
Martín Abadi , Michael Burrows , Ted Wobber Moderately Hard, Memory-Bound Functions. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Anca-Andreea Ivan , Yevgeniy Dodis Proxy Cryptography Revisited. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Brennen Reynolds , Dipak Ghosal Secure IP Telephony using Multi-layered Protection. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] John Ioannidis Fighting Spam by Encapsulating Policy in Email Addresses. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Efficient Security Mechanisms for Routing Protocolsa. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Alain Pannetrat , Refik Molva Efficient Multicast Packet Authentication. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Eu-Jin Goh , Hovav Shacham , Nagendra Modadugu , Dan Boneh SiRiUS: Securing Remote Untrusted Storage. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Pekka Nikander , Jukka Ylitalo , Jorma Wall Integrating Security, Mobility and Multi-Homing in a HIP Way. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Antonio Nicolosi , Maxwell N. Krohn , Yevgeniy Dodis , David Mazières Proactive Two-Party Signatures for User Authentication. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Tal Garfinkel , Mendel Rosenblum A Virtual Machine Introspection Based Architecture for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Tal Garfinkel Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Geoffrey Goodell , William Aiello , Timothy Griffin , John Ioannidis , Patrick Drew McDaniel , Aviel D. Rubin Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Donggang Liu , Peng Ning Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Eric Haugh , Matt Bishop Testing C Programs for Buffer Overflow Vulnerabilities. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Ahsan Habib , Mohamed Hefeeda , Bharat K. Bhargava Detecting Service Violations and DoS Attacks. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Martín Abadi , Cédric Fournet Access Control Based on Execution History. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] John Wilander , Mariam Kamkar A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ]