|
Journals in DBLP
- Trent Jaeger, Antony Edwards, Xiaolan Zhang
Consistency analysis of authorization hook placement in the Linux security modules framework. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:175-205 [Journal]
- Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:206-241 [Journal]
- William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal]
- Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu
Techniques and tools for analyzing intrusion alerts. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:274-318 [Journal]
- Adam Stubblefield, John Ioannidis, Aviel D. Rubin
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:319-332 [Journal]
|