Abstract is missing.
- The Perils of Unauthenticated Encryption: Kerberos Version 4Tom Yu, Sam Hartman, Kenneth Raeburn. [doi]
- Global Intrusion Detection in the DOMINO Overlay SystemVinod Yegneswaran, Paul Barford, Somesh Jha. [doi]
- Building Attack Scenarios through Integration of Complementary Alert Correlation MethodPeng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant. [doi]
- Efficient Context-Sensitive Intrusion DetectionJonathon T. Giffin, Somesh Jha, Barton P. Miller. [doi]
- Speeding up Secure Web Transactions Using Elliptic Curve CryptographyVipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang Shantz, Nils Gura, Hans Eberle. [doi]
- Distillation Codes and Applications to DoS Resistant Multicast AuthenticationChris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar. [doi]
- The Design and Implementation of Datagram TLSNagendra Modadugu, Eric Rescorla. [doi]
- DoS Protection for Reliably Authenticated BroadcastCarl A. Gunter, Sanjeev Khanna, Kaijun Tan, Santosh S. Venkatesh. [doi]
- Ostia: A Delegating Architecture for Secure System Call InterpositionTal Garfinkel, Ben Pfaff, Mendel Rosenblum. [doi]
- Model Checking One Million Lines of C CodeHao Chen, Drew Dean, David Wagner. [doi]
- A Practical Dynamic Buffer Overflow DetectorOlatunji Ruwase, Monica S. Lam. [doi]
- Building an Encrypted and Searchable Audit LogBrent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters. [doi]
- Client-Side Defense Against Web-Based Identity TheftNeil Chou, Robert Ledesma, Yuka Teraguchi, John C. Mitchell. [doi]
- Using Directional Antennas to Prevent Wormhole AttacksLingxuan Hu, David Evans. [doi]
- Authentication and Integrity in Outsourced DatabasesEinar Mykletun, Maithili Narasimha, Gene Tsudik. [doi]
- An Effective Architecture and Algorithm for Detecting Worms with Various ScanJiang Wu, Sarma Vangala, Lixin Gao, Kevin A. Kwiat. [doi]