Abstract is missing.
- SC-CFS: Smartcard Secured Cryptographic File SystemNaomaru Itoi. [doi]
- A Method for Fast Revocation of Public Key Certificates and Security CapabilitiesDan Boneh, Xuhua Ding, Gene Tsudik, Chi-Ming Wong. [doi]
- MULTOPS: A Data-Structure for Bandwidth Attack DetectionThomer M. Gil, Massimiliano Poletto. [doi]
- Inferring Internet Denial-of-Service ActivityDavid Moore, Geoffrey M. Voelker, Stefan Savage. [doi]
- Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per HostPeter M. Gleitz, Steven M. Bellovin. [doi]
- Architecting the Lumeta Firewall AnalyzerAvishai Wool. [doi]
- Defending Against Statistical SteganalysisNiels Provos. [doi]
- Data Remanence in Semiconductor DevicesPeter Gutmann. [doi]
- FormatGuard: Automatic Protection From printf Format String VulnerabilitiesCrispin Cowan, Matt Barringer, Steve Beattie, Greg Kroah-Hartman, Michael Frantzen, Jamie Lokier. [doi]
- Reading Between the Lines: Lessons from the SDMI ChallengeScott Craver, Min Wu 0001, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, Edward W. Felten. [doi]
- Timing Analysis of Keystrokes and Timing Attacks on SSHDawn Xiaodong Song, David Wagner, Xuqing Tian. [doi]
- Capability File Names: Separating Authorisation From User Management in an Internet File SystemJude T. Regan, Christian D. Jensen. [doi]
- Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol SemanticsMark Handley, Vern Paxson, Christian Kreibich. [doi]
- Secure Data Deletion for Linux File SystemsSteven Bauer, Nissanka Bodhi Priyantha. [doi]
- StackGhost: Hardware Facilitated Stack ProtectionMichael Frantzen, Michael Shuey. [doi]
- Kerberized Credential Translation: A Solution to Web Access ControlOlga Kornievskaia, Peter Honeyman, Bill Doster, Kevin Coffman. [doi]
- Using Client Puzzles to Protect TLSDrew Dean, Adam Stubblefield. [doi]
- Improving DES Coprocessor Throughput for Short OperationsMark Lindemann, Sean W. Smith. [doi]
- Statically Detecting Likely Buffer Overflow VulnerabilitiesDavid Larochelle, David Evans. [doi]
- PDM: A New Strong Password-Based ProtocolCharlie Kaufman, Radia J. Perlman. [doi]
- Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats [doi]
- Secure Distribution of Events in Content-Based Publish Subscribe SystemsLukasz Opyrchal, Atul Prakash. [doi]
- The Dos and Don'ts of Client Authentication on the WebKevin Fu, Emil Sit, Kendra Smith, Nick Feamster. [doi]
- RaceGuard: Kernel Protection From Temporary File Race VulnerabilitiesCrispin Cowan, Steve Beattie, Chris Wright, Greg Kroah-Hartman. [doi]
- Detecting Format String Vulnerabilities with Type QualifiersUmesh Shankar, Kunal Talwar, Jeffrey S. Foster, David Wagner. [doi]