Abstract is missing.
- Privacy cognizant information systemsRakesh Agrawal. 1 [doi]
- DoS protection for UDP-based protocolsCharlie Kaufman, Radia J. Perlman, Bill Sommerfeld. 2-7 [doi]
- Using graphic turing tests to counter automated DDoS attacks against web serversWilliam G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. 8-19 [doi]
- Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delaysXinyuan Wang, Douglas S. Reeves. 20-29 [doi]
- Hop-count filtering: an effective defense against spoofed DDoS trafficCheng Jin, Haining Wang, Kang G. Shin. 30-41 [doi]
- A pairwise key pre-distribution scheme for wireless sensor networksWenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney. 42-51 [doi]
- Establishing pairwise keys in distributed sensor networksDonggang Liu, Peng Ning. 52-61 [doi]
- LEAP: efficient security mechanisms for large-scale distributed sensor networksSencun Zhu, Sanjeev Setia, Sushil Jajodia. 62-72 [doi]
- XML access control using static analysisMakoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada. 73-84 [doi]
- On permissions, inheritance and role hierarchiesJason Crampton. 85-92 [doi]
- Balancing confidentiality and efficiency in untrusted relational DBMSsErnesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 93-102 [doi]
- The blocker tag: selective blocking of RFID tags for consumer privacyAri Juels, Ronald L. Rivest, Michael Szydlo. 103-111 [doi]
- Receiver anonymity via incomparable public keysBrent R. Waters, Edward W. Felten, Amit Sahai. 112-121 [doi]
- k-anonymous message transmissionLuis von Ahn, Andrew Bortz, Nicholas J. Hopper. 122-130 [doi]
- On the performance, feasibility, and use of forward-secure signaturesEric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew McDaniel. 131-144 [doi]
- Print signatures for document authenticationBaoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli. 145-154 [doi]
- Efficiency improvements for signature schemes with tight security reductionsJonathan Katz, Nan Wang. 155-164 [doi]
- Origin authentication in interdomain routingWilliam Aiello, John Ioannidis, Patrick Drew McDaniel. 165-178 [doi]
- Incentive-based modeling and inference of attacker intent, objectives, and strategiesPeng Liu, Wanyu Zang. 179-189 [doi]
- Monitoring and early warning for internet wormsCliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley. 190-199 [doi]
- Learning attack strategies from intrusion alertsPeng Ning, Dingbang Xu. 200-209 [doi]
- Automatic generation of two-party computationsPhilip D. MacKenzie, Alina Oprea, Michael K. Reiter. 210-219 [doi]
- A composable cryptographic library with nested operationsMichael Backes, Birgit Pfitzmann, Michael Waidner. 220-230 [doi]
- Efficient self-healing group key distribution with revocation capabilityDonggang Liu, Peng Ning, Kun Sun. 231-240 [doi]
- Security proofs for an efficient password-based key exchangeEmmanuel Bresson, Olivier Chevassut, David Pointcheval. 241-250 [doi]
- Anomaly detection of web-based attacksChristopher Krügel, Giovanni Vigna. 251-261 [doi]
- Enhancing byte-level network intrusion detection signatures with contextRobin Sommer, Vern Paxson. 262-271 [doi]
- Countering code-injection attacks with instruction-set randomizationGaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis. 272-280 [doi]
- Randomized instruction set emulation to disrupt binary code injection attacksElena Gabriela Barrantes, David H. Ackley, Trek S. Palmer, Darko Stefanovic, Dino Dai Zovi. 281-289 [doi]
- Obfuscation of executable code to improve resistance to static disassemblyCullen Linn, Saumya K. Debray. 290-299 [doi]
- PPay: micropayments for peer-to-peer systemsBeverly Yang, Hector Garcia-Molina. 300-310 [doi]
- A new CRT-RSA algorithm secure against bellcore attacksJohannes Blömer, Martin Otto 0002, Jean-Pierre Seifert. 311-320 [doi]
- MECA: an extensible, expressive system and language for statically checking security propertiesJunfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler. 321-334 [doi]
- CDiff: a new reduction technique for constraint-based analysis of security protocolsDavid A. Basin, Sebastian Mödersheim, Luca Viganò. 335-344 [doi]
- Buffer overrun detection using linear programming and static analysisVinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek. 345-354 [doi]
- Cryptographic tamper evidenceGene Itkis. 355-364 [doi]