Abstract is missing.
- Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application TechnologiesDeborah Shands, Richard Yee, Jay Jacobs, E. John Sebes. [doi]
- User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and ConfinementK. Jain, R. Sekar. [doi]
- Accountability and Control of Process Creation in MetasystemsMarty Humphrey, Frederick Knabe, Adam Ferrari, Andrew S. Grimshaw. [doi]
- Secure Password-Based Cipher Suite for TLSPeter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner. [doi]
- A Lightweight Tool for Detecting Web Server AttacksMagnus Almgren, Hervé Debar, Marc Dacier. [doi]
- Chameleon SignaturesHugo Krawczyk, Tal Rabin. [doi]
- Analysis of a Fair Exchange ProtocolVitaly Shmatikov, John C. Mitchell. [doi]
- Optimized Rekey for Group Communication SystemsOhad Rodeh, Kenneth P. Birman, Danny Dolev. [doi]
- A First Step Towards Automated Detection of Buffer Overrun VulnerabilitiesDavid Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken. [doi]
- Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment IssuesStephen T. Kent, Charles Lynn, Joanne Mikkelson, Karen Seo. [doi]
- An IPSec-based Host Architecture for Secure Internet MulticastRan Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha. [doi]
- A Revocation, Validation and Authentication Protocol for SPKI Based Delegation SystemsYki Kortesniemi, Tero Hasu, Jonna Särs. [doi]
- Building Adaptive and Agile Applications Using Intrusion Detection and ResponseJoseph P. Loyall, Partha Pratim Pal, Richard E. Schantz, Franklin Webber. [doi]
- A First Step Towards the Automatic Generation of Security ProtocolsAdrian Perrig, Dawn Xiaodong Song. [doi]
- Security of Encrypted rlogin Connections Created With Kerberos IVKirsten Hildrum. [doi]