Abstract is missing.
- Authenticated encryption in SSH: provably fixing the SSH binary packet protocolMihir Bellare, Tadayoshi Kohno, Chanathip Namprempre. 1-11 [doi]
- The verification of an industrial payment protocol: the SET purchase phaseGiampaolo Bella, Lawrence C. Paulson, Fabio Massacci. 12-20 [doi]
- Design and implementation of the ::::idemix:::: anonymous credential systemJan Camenisch, Els Van Herreweghen. 21-30 [doi]
- A temporal key management scheme for secure broadcasting of XML documentsElisa Bertino, Barbara Carminati, Elena Ferrari. 31-40 [doi]
- A key-management scheme for distributed sensor networksLaurent Eschenauer, Virgil D. Gligor. 41-47 [doi]
- Efficient, DoS-resistant, secure key exchange for internet protocolsWilliam Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis. 48-58 [doi]
- Defending against redirect attacks in mobile IPRobert H. Deng, Jianying Zhou, Feng Bao. 59-67 [doi]
- Almost entirely correct mixing with applications to votingDan Boneh, Philippe Golle. 68-77 [doi]
- DRM: doesn t realy mean digital copyright managementL. Jean Camp. 78-87 [doi]
- Asynchronous verifiable secret sharing and proactive cryptosystemsChristian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl. 88-97 [doi]
- Authenticated-encryption with associated-dataPhillip Rogaway. 98-107 [doi]
- Generic implementations of elliptic curve cryptography using partial reductionNils Gura, Hans Eberle, Sheueling Chang Shantz. 108-116 [doi]
- Efficient packet marking for large-scale IP tracebackMichael T. Goodrich. 117-126 [doi]
- Sensor-based intrusion detection for intra-domain distance-vector routingVishal Mittal, Giovanni Vigna. 127-137 [doi]
- Code red worm propagation modeling and analysisCliff Changchun Zou, Weibo Gong, Donald F. Towsley. 138-147 [doi]
- Silicon physical random functionsBlaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas. 148-160 [doi]
- Securing passwords against dictionary attacksBenny Pinkas, Tomas Sander. 161-170 [doi]
- Policy algebras for access control the predicate caseDuminda Wijesekera, Sushil Jajodia. 171-180 [doi]
- Query-flood DoS attacks in gnutellaNeil Daswani, Hector Garcia-Molina. 181-192 [doi]
- Tarzan: a peer-to-peer anonymizing network layerMichael J. Freedman, Robert Morris. 193-206 [doi]
- A reputation-based approach for choosing reliable resources in peer-to-peer networksErnesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante. 207-216 [doi]
- Scalable, graph-based network vulnerability analysisPaul Ammann, Duminda Wijesekera, Saket Kaushik. 217-224 [doi]
- Runtime verification of authorization hook placement for the linux security modules frameworkAntony Edwards, Trent Jaeger, Xiaolan Zhang. 225-234 [doi]
- MOPS: an infrastructure for examining security properties of softwareHao Chen, David Wagner. 235-244 [doi]
- Constructing attack scenarios through correlation of intrusion alertsPeng Ning, Yun Cui, Douglas S. Reeves. 245-254 [doi]
- Mimicry attacks on host-based intrusion detection systemsDavid Wagner, Paolo Soto. 255-264 [doi]
- Specification-based anomaly detection: a new approach for detecting network intrusionsR. Sekar, Ajay K. Gupta 0002, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou. 265-274 [doi]