USENIX Security '00 | Detecting Backdoors | Yin Zhang, Vern Paxson |
USENIX Security '00 | Detecting Stepping Stones | |
USENIX Security '00 | Automated Response Using System-Call Delay | Anil Somayaji, Stephanie Forrest |
USENIX Security '00 | CenterTrack: An IP Overlay Network for Tracking DoS Floods | Robert Stone |
USENIX Security '00 | A Multi-Layer IPSEC Protocol | Yongguang Zhang, Bikramjit Singh |
USENIX Security '00 | Defeating TCP/IP Stack Fingerprinting | Matthew Smart, G. Robert Malan, Farnam Jahanian |
USENIX Security '00 | A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols | Jonathan Katz, Bruce Schneier |
USENIX Security '00 | PGP in Constrained Wireless Devices | Michael Brown, Donny Cheung, Darrel Hankerson, Julio Lopez Hernandez, Michael Kirkup, Alfred Menezes |
USENIX Security '00 | Shibboleth: Private Mailing List Manager | Matt Curtin |
USENIX Security '99 | The Design and Analysis of Graphical Passwords | Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, Aviel Rubin |
USENIX Security '99 | Hand-Held Computers Can Be Better Smart Cards | Dirk Balfanz, Edward W. Felten |
USENIX Security '99 | Offline Delegation | Arne Helme, Tage Stabell-Kulø |
USENIX Security '99 | Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories | Tse-Huong Choo |
USENIX Security '99 | Enforcing Well-Formed and Partially-Formed Transactions for UNIX | Dean Povey |
USENIX Security '99 | Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications | R. Sekar, Prem UppuluriR. Sekar |
USENIX Security '99 | Building Intrusion-Tolerant Applications | Thomas Wu, Michael Malkin, Dan Boneh |
USENIX Security '99 | Brute Force Attack on UNIX Passwords with SIMD Computer | Gershon Kedem, Yuriko Ishihara |
USENIX Security '99 | Antigone: A Flexible Framework for Secure Group Communication | Patrick McDaniel, Atul Prakash, Peter Honeyman |
USENIX Security '99 | A Secure Station for Network Monitoring and Control | |
USENIX Security '99 | The Flask Security Architecture: System Support for Diverse Security Policies | Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, Dave Andersen, Jay Lepreau |
USENIX Security '99 | A Study in Using Neural Networks for Anomaly and Misuse Detection | Anup K. Ghosh, Aaron Schwartzbard |
USENIX Security '99 | The Design of a Cryptographic Security Architecture | Peter Gutmann |
USENIX Security '99 | Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 | Alma Whitten, J. D. Tygar |
USENIX Security '99 | Jonah: Experience Implementing PKIX Reference Freeware | Mary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Macek, Ann Graham, Jim Wade, Tom Sandlin |
USENIX Security '99 | Scalable Access Control for Distributed Object Systems | Daniel F. Sterne, Gregg W. Tally, C. Durward McDonell, David L. Sherman, David L. Sames, Pierre X. Pasturel, E. John Sebes |