Abstract is missing.
- Performance Analysis of TLS Web ServersCristian Coarfa, Peter Druschel, Dan S. Wallach. [doi]
- Experimenting with Server-Aided SignaturesXuhua Ding, Daniele Mazzocchi, Gene Tsudik. [doi]
- Implementing Pushback: Router-Based Defense Against DDoS AttacksJohn Ioannidis, Steven M. Bellovin. [doi]
- Active Certificates: A Framework for DelegationNikita Borisov, Eric A. Brewer. [doi]
- Talking to Strangers: Authentication in Ad-Hoc Wireless NetworksDirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong. [doi]
- Using the Fluhrer, Mantin, and Shamir Attack to Break WEPAdam Stubblefield, John Ioannidis, Aviel D. Rubin. [doi]
- Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and AddressesGabriel Montenegro, Claude Castelluccia. [doi]
- Managing Interoperability in Non-Hierarchical Public Key InfrastructuresPeter Hesse, David Lemire. [doi]
- Fast-Track Session Establishment for TLSHovav Shacham, Dan Boneh. [doi]
- PAMINA: A Certificate Based Privilege Management SystemZoltán Nochta, Peter Ebinger, Sebastian Abeck. [doi]
- BlueBox: A Policy-Driven, Host-Based Intrusion Detection SystemSuresh Chari, Pau-Chen Cheng. [doi]
- Advanced Client/Server Authentication in TLSAdam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith. [doi]
- Detecting Steganographic Content on the InternetNiels Provos, Peter Honeyman. [doi]
- Distributed Pattern Detection for Intrusion DetectionChristopher Krügel, Thomas Toth. [doi]
- An Analysis of the Degradation of Anonymous ProtocolsMatthew Wright, Micah Adler, Brian Neil Levine, Clay Shields. 1-12 [doi]