Abstract is missing.
- Mixminion: Design of a Type III Anonymous Remailer ProtocolGeorge Danezis, Roger Dingledine, Nick Mathewson. 2-15 [doi]
- Probabilistic Treatment of MIXes to Hamper Traffic AnalysisDakshi Agrawal, Dogan Kesdogan, Stefan Penz. 16-27 [doi]
- Defending Anonymous Communications Against Passive Logging AttackMatthew Wright, Micah Adler, Brian Neil Levine, Clay Shields. 28 [doi]
- Active Mapping: Resisting NIDS Evasion without Altering TrafficUmesh Shankar, Vern Paxson. 44-61 [doi]
- Anomaly Detection Using Call Stack InformationHenry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong. 62 [doi]
- Defending Against Denial-of-Service Attacks with Puzzle AuctionXiaofeng Wang, Michael K. Reiter. 78-92 [doi]
- Pi: A Path Identification Mechanism to Defend against DDoS AttackAbraham Yaar, Adrian Perrig, Dawn Xiaodong Song. 93 [doi]
- A Unified Scheme for Resource Protection in Automated Trust NegotiationTing Yu, Marianne Winslett. 110-122 [doi]
- Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust ManagementNinghui Li, William H. Winsborough, John C. Mitchell. 123-139 [doi]
- Intransitive Non-Interference for Cryptographic PurposeMichael Backes, Birgit Pfitzmann. 140 [doi]
- Using Memory Errors to Attack a Virtual MachineSudhakar Govindavajhala, Andrew W. Appel. 154-165 [doi]
- Specifying and Verifying Hardware for Tamper-Resistant SoftwareDavid Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz. 166 [doi]
- Secret Handshakes from Pairing-Based Key AgreementsDirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao Chi Wong. 180-196 [doi]
- Random Key Predistribution Schemes for Sensor NetworksHaowen Chan, Adrian Perrig, Dawn Xiaodong Song. 197 [doi]
- Hardening Functions for Large Scale Distributed ComputationsDoug Szajda, Barry G. Lawson, Jason Owen. 216-224 [doi]
- A Practical Revocation Scheme for Broadcast Encryption Using Smart CardsNoam Kogan, Yuval Shavitt, Avishai Wool. 225-235 [doi]
- Using Replication and Partitioning to Build Secure Distributed SystemsLantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic. 236-250 [doi]
- Vulnerabilities in Synchronous IPC DesignsJonathan S. Shapiro. 251-262 [doi]
- Garbage Collector Memory Accounting in Language-Based SystemsDavid W. Price, Algis Rudys, Dan S. Wallach. 263-274 [doi]