Abstract is missing.
- Proxy Cryptography RevisitedAnca-Andreea Ivan, Yevgeniy Dodis. [doi]
- Moderately Hard, Memory-Bound FunctionsMartín Abadi, Michael Burrows, Ted Wobber. [doi]
- A Virtual Machine Introspection Based Architecture for Intrusion DetectionTal Garfinkel, Mendel Rosenblum. [doi]
- SiRiUS: Securing Remote Untrusted StorageEu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh. [doi]
- Access Control Based on Execution HistoryMartín Abadi, Cédric Fournet. [doi]
- Testing C Programs for Buffer Overflow VulnerabilitiesEric Haugh, Matt Bishop. [doi]
- Traps and Pitfalls: Practical Problems in System Call Interposition Based Security ToolsTal Garfinkel. [doi]
- Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain RoutingGeoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin. [doi]
- Secure IP Telephony using Multi-layered ProtectionBrennen Reynolds, Dipak Ghosal. [doi]
- Efficient Security Mechanisms for Routing ProtocolsaYih-Chun Hu, Adrian Perrig, David B. Johnson. [doi]
- A Comparison of Publicly Available Tools for Dynamic Buffer Overflow PreventionJohn Wilander, Mariam Kamkar. [doi]
- Efficient Multicast Packet AuthenticationAlain Pannetrat, Refik Molva. [doi]
- Integrating Security, Mobility and Multi-Homing in a HIP WayPekka Nikander, Jukka Ylitalo, Jorma Wall. [doi]
- Fighting Spam by Encapsulating Policy in Email AddressesJohn Ioannidis. [doi]
- Proactive Two-Party Signatures for User AuthenticationAntonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis, David Mazières. [doi]
- Detecting Service Violations and DoS AttacksAhsan Habib, Mohamed Hefeeda, Bharat K. Bhargava. [doi]
- Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor NetworksDonggang Liu, Peng Ning. [doi]