Papers

Search results

    ConferenceTitleAuthor(s)
    COOTS '98Quality of Service Specification in Distributed Object Systems DesignSvend Frolund, Jari Koistinen
    COOTS '98Efficient Implementation of Java Remote Method Invocation (RMI)Vijaykumar Krishnaswamy, Dan Walther, Sumeer Bhola, Ethendranath Bommaiah, George Riley, Brad Topol, Mustaque Ahamad
    COOTS '98The Design and Performance of MedJavaPrashant Jain, Seth Widoff, Douglas C. Schmidt
    USENIX Security '98Certificate Revocation and Certificate UpdateKobbi Nissim, Moni Naor
    USENIX Security '98Attack-Resistant Trust Metrics for Public Key CertificationRaph Levien, Alex Aiken
    USENIX Security '98Software Generation of Practically Strong Random NumbersPeter Gutmann
    USENIX Security '98Towards Web Security Using PLASMAA. Krannig
    USENIX Security '98Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and RemediesVinod Anupam, Alain Mayer
    USENIX Security '98Finite-State Analysis of SSL 3.0John C. Mitchell, Vitaly Shmatikov, Ulrich Stern
    USENIX Security '98Unified Support for Heterogeneous Security Policies in Distributed SystemsVictoria Ungureanu, Naftaly H. Minsky
    USENIX Security '98Operating System Protection for Fine-Grained ProgramsTrent Jaeger, Jochen Liedtke, Nayeem Islam
    USENIX Security '98Expanding and Extending the Security Features of JavaKaren R. Sollins, Nimisha V. Mehta
    USENIX Security '98Securing Classical IP Over ATM NetworksCarsten Benecke, Uwe Ellermann
    USENIX Security '98A Java Beans Component Architecture for Cryptographic ProtocolsPekka Nikander, Arto Karila
    USENIX Security '98Secure VideoconferencingPeter Honeyman, Andy Adamson, Kevin Coffman, Janani Janakiraman, Rob Jerdonek, Jim Rees
    USENIX Security '98Bro: A System for Detecting Network Intruders in Real-TimeVern Paxson
    USENIX Security '98Cryptographic Support for Secure Logs on Untrusted MachinesBruce Schneier, John Kelsey
    USENIX Security '98StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow AttacksCrispan Cowan
    USENIX Security '98Data Mining Approaches for Intrusion DetectionWenke Lee, Salvatore J. Stolfo
    USENIX Security '98A Comparison of Methods for Implementing Adaptive Security PoliciesBrian Loe, Michael Carney
    USENIX Security '98The CRISIS Wide Area Security ArchitectureEshwar Belani, Amin Vahdat, Thomas E. Anderson, Michael Dahlin
    USITS '97The Search BrokerPeter Bigot
    USITS '97Using the Structure of HTML Documents to Improve RetrievalMichal Cutler, Yungming Shih, Weiyi Meng
    USITS '97SASE: Implementation of a Compressed Text Search EngineSrinidhi Varadarajan, Tzi-cker Chiueh
    USITS '97Cost-Aware WWW Proxy Caching AlgorithmsPei Cao, Sandy Irani

Pages