The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
2005 (conf/ndss/2005)

  1. Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  2. Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
    Pretty Secure BGP, psBGP. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  3. Shobha Venkataraman, Dawn Xiaodong Song, Phillip B. Gibbons, Avrim Blum
    New Streaming Algorithms for Fast Detection of Superspreaders. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  4. Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
    One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  5. Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein
    MOVE: An End-to-End Solution to Network Denial of Service. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  6. Alexey Smirnov, Tzi-cker Chiueh
    DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  7. Qiang Huang, Helen J. Wang, Nikita Borisov
    Privacy-Preserving Friends Troubleshooting Network. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  8. Alina Oprea, Michael K. Reiter
    Space-Efficient Block Storage Integrity. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  9. James Newsome, Dawn Xiaodong Song
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  10. Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang
    A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  11. Xiapu Luo, Rocky K. C. Chang
    On a New Class of Pulsing Denial-of-Service Attacks and the Defense. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  12. Sandeep S. Kulkarni, Bezawada Bruhadeshwar
    Rekeying and Storage Cost for Multiple User Revocation. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  13. Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, Peter M. Chen
    Enriching Intrusion Alerts Through Multi-Host Causality. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  14. Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario
    The Internet Motion Sensor - A Distributed Blackhole Monitoring System. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  15. Changhua He, John C. Mitchell
    Security Analysis and Improvements for IEEE 802.11i. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  16. David Whyte, Evangelos Kranakis, Paul C. van Oorschot
    DNS-based Detection of Scanning Worms in an Enterprise Network. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002