Abstract is missing.
- A Multi-Layer IPSEC ProtocolYongguang Zhang, Bikramjit Singh. [doi]
- Detecting BackdoorsYin Zhang, Vern Paxson. [doi]
- Detecting Stepping StonesYin Zhang, Vern Paxson. [doi]
- Defeating TCP/IP Stack FingerprintingMatthew Smart, G. Robert Malan, Farnam Jahanian. [doi]
- Encrypting Virtual MemoryNiels Provos. [doi]
- PGP in Constrained Wireless DevicesMichael Brown, Donny Cheung, Darrel Hankerson, Julio López Hernandez, Michael Kirkup, Alfred Menezes. [doi]
- MAPbox: Using Parameterized Behavior Classes to Confine Untrusted ApplicationsAnurag Acharya, Mandar Raje. [doi]
- An Open-Source Cryptographic CoprocessorPeter Gutmann. [doi]
- Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing SystemMarc Waldman, Aviel D. Rubin, Lorrie Faith Cranor. [doi]
- Secure Coprocessor Integration with Kerberos V5Naomaru Itoi. [doi]
- A Secure Java Virtual MachineLeendert van Doorn. [doi]
- Automated Response Using System-Call DelayAnil Somayaji, Stephanie Forrest. [doi]
- A Chosen Ciphertext Attack Against Several E-Mail Encryption ProtocolsJonathan Katz, Bruce Schneier. [doi]
- Deja Vu-A User Study: Using Images for AuthenticationRachna Dhamija, Adrian Perrig. [doi]
- Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine MonitorJohn Scott Robin, Cynthia E. Irvine. [doi]
- Can Pseudonymity Really Guarantee Privacy?Josyula R. Rao, Pankaj Rohatgi. [doi]
- Shibboleth: Private Mailing List ManagerMatt Curtin. [doi]
- Probabilistic Counting of Large Digital Signature CollectionsMarkus G. Kuhn. [doi]
- CenterTrack: An IP Overlay Network for Tracking DoS FloodsRobert Stone. [doi]
- Detecting and Countering System Intrusions Using Software WrappersCalvin Ko, Timothy Fraser, Lee Badger, Douglas Kilpatrickv. [doi]