|
Conferences in DBLP
- Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
Pretty Secure BGP, psBGP. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Shobha Venkataraman, Dawn Xiaodong Song, Phillip B. Gibbons, Avrim Blum
New Streaming Algorithms for Fast Detection of Superspreaders. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein
MOVE: An End-to-End Solution to Network Denial of Service. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Alexey Smirnov, Tzi-cker Chiueh
DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Qiang Huang, Helen J. Wang, Nikita Borisov
Privacy-Preserving Friends Troubleshooting Network. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Alina Oprea, Michael K. Reiter
Space-Efficient Block Storage Integrity. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- James Newsome, Dawn Xiaodong Song
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Xiapu Luo, Rocky K. C. Chang
On a New Class of Pulsing Denial-of-Service Attacks and the Defense. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Sandeep S. Kulkarni, Bezawada Bruhadeshwar
Rekeying and Storage Cost for Multiple User Revocation. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, Peter M. Chen
Enriching Intrusion Alerts Through Multi-Host Causality. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario
The Internet Motion Sensor - A Distributed Blackhole Monitoring System. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Changhua He, John C. Mitchell
Security Analysis and Improvements for IEEE 802.11i. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- David Whyte, Evangelos Kranakis, Paul C. van Oorschot
DNS-based Detection of Scanning Worms in an Enterprise Network. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
|