USENIX Security '00 | An Open-Source Cryptographic Coprocessor | Peter Gutmann |
USENIX Security '00 | Secure Coprocessor Integration with Kerberos V5 | Naomaru Itoi |
USENIX Security '00 | Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor | John Scott Robin, Cynthia E. Irvine |
USENIX Security '00 | Detecting and Countering System Intrusions Using Software Wrappers | Calvin Ko, Timothy Fraser, Lee Badger, Douglas Kilpatrickv |
USENIX Security '00 | Detecting Backdoors | Yin Zhang, Vern Paxson |
USENIX Security '00 | Detecting Stepping Stones | |
USENIX Security '00 | Automated Response Using System-Call Delay | Anil Somayaji, Stephanie Forrest |
USENIX Security '00 | CenterTrack: An IP Overlay Network for Tracking DoS Floods | Robert Stone |
USENIX Security '00 | A Multi-Layer IPSEC Protocol | Yongguang Zhang, Bikramjit Singh |
USENIX Security '00 | Defeating TCP/IP Stack Fingerprinting | Matthew Smart, G. Robert Malan, Farnam Jahanian |
USENIX Security '00 | A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols | Jonathan Katz, Bruce Schneier |
USENIX Security '00 | PGP in Constrained Wireless Devices | Michael Brown, Donny Cheung, Darrel Hankerson, Julio Lopez Hernandez, Michael Kirkup, Alfred Menezes |
USENIX Security '00 | Shibboleth: Private Mailing List Manager | Matt Curtin |
4th USENIX Windows Systems Symposium | Archipelago: An Island-Based File System for Highly Available and Scalable Internet Services | Minwen Ji, Edward W. Felten, Randolph Wang, Jaswinder Pal Singh |
4th USENIX Windows Systems Symposium | Single Instance Storage in Windows 2000 | Bill Bolosky, Scott Corbin, David Goebel, John Douceur |
4th USENIX Windows Systems Symposium | User-level Resource-constrained Sandboxing | Fangzhe Chang, Ayal Itzkovitz, Vijay Karamcheti |
4th USENIX Windows Systems Symposium | WindowBox: A Simple Security Model for the Connected Desktop | Dirk Balfanz, Daniel R. Simon |
4th USENIX Windows Systems Symposium | An Objectbase Schema Evolution Approach to Windows NT Security | Ken Barker, Raj Jayaplan, Randal Peters |
4th USENIX Windows Systems Symposium | An Empirical Study of the Robustness of Windows NT Applications Using Random Testing | Justin Forrester, Barton Miller |
4th USENIX Windows Systems Symposium | Gemini Lite: A Non-Intrusive Debugger for Windows NT | Ryan Wallach |
4th USENIX Windows Systems Symposium | Extending the Windows Desktop Interface with Connected Handheld Computers | Brad Myers, Robert Miller, Benjamin Bostwick, Carl Evankovich |
4th USENIX Windows Systems Symposium | Opportunities for Bandwidth Adaptation in Microsoft Office Documents | Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel |
4th USENIX Windows Systems Symposium | A Toolkit for Building Dependable and Extensible Home Networking Applications | Yi-Min Wang, Wilf Russell, Anish Arora |
4th USENIX Windows Systems Symposium | WSDLite: A Lightweight Alternative to Windows Sockets Direct Path | Evan Speight, Hazim Abdel-Shafi, John K. Bennett |
4th USENIX Windows Systems Symposium | Global Memory Management for a Multi-Computer System | Dejan Milojicic, Steve Hoyle, Alan Messer, Albert Munoz, Lance Russell, Tom Wylegala, Vivekanand Vellanki, Stephen Childs |