


default search action
NDSS 2004: San Diego, California, USA
Multicast Authentication
- Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, Santosh S. Venkatesh:

DoS Protection for Reliably Authenticated Broadcast. - Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar:

Distillation Codes and Applications to DoS Resistant Multicast Authentication.
Intrusion Detection
- Jonathon T. Giffin, Somesh Jha, Barton P. Miller:

Efficient Context-Sensitive Intrusion Detection. - Vinod Yegneswaran, Paul Barford, Somesh Jha:

Global Intrusion Detection in the DOMINO Overlay System. - Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant:

Building Attack Scenarios through Integration of Complementary Alert Correlation Method.
New Directions
- Neil Chou, Robert Ledesma, Yuka Teraguchi, John C. Mitchell:

Client-Side Defense Against Web-Based Identity Theft. - Lingxuan Hu, David Evans:

Using Directional Antennas to Prevent Wormhole Attacks. - Jiang Wu, Sarma Vangala, Lixin Gao, Kevin A. Kwiat:

An Effective Architecture and Algorithm for Detecting Worms with Various Scan.
Secure Software
- Olatunji Ruwase, Monica S. Lam:

A Practical Dynamic Buffer Overflow Detector. - Hao Chen, Drew Dean, David A. Wagner:

Model Checking One Million Lines of C Code. - Tal Garfinkel, Ben Pfaff, Mendel Rosenblum:

Ostia: A Delegating Architecture for Secure System Call Interposition.
Database and Audit Log Protection
- Einar Mykletun, Maithili Narasimha, Gene Tsudik:

Authentication and Integrity in Outsourced Databases. - Brent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters:

Building an Encrypted and Searchable Audit Log.
Protocols
- Vipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang Shantz, Nils Gura, Hans Eberle:

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography. - Nagendra Modadugu, Eric Rescorla:

The Design and Implementation of Datagram TLS. - Tom Yu, Sam Hartman, Kenneth Raeburn:

The Perils of Unauthenticated Encryption: Kerberos Version 4.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














