Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '00Detecting BackdoorsYin Zhang, Vern Paxson
    USENIX Security '00Detecting Stepping Stones
    USENIX Security '00Automated Response Using System-Call DelayAnil Somayaji, Stephanie Forrest
    USENIX Security '00CenterTrack: An IP Overlay Network for Tracking DoS FloodsRobert Stone
    USENIX Security '00A Multi-Layer IPSEC ProtocolYongguang Zhang, Bikramjit Singh
    USENIX Security '00Defeating TCP/IP Stack FingerprintingMatthew Smart, G. Robert Malan, Farnam Jahanian
    USENIX Security '00A Chosen Ciphertext Attack Against Several E-Mail Encryption ProtocolsJonathan Katz, Bruce Schneier
    USENIX Security '00PGP in Constrained Wireless DevicesMichael Brown, Donny Cheung, Darrel Hankerson, Julio Lopez Hernandez, Michael Kirkup, Alfred Menezes
    USENIX Security '00Shibboleth: Private Mailing List ManagerMatt Curtin
    USENIX Security '99The Design and Analysis of Graphical PasswordsIan Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, Aviel Rubin
    USENIX Security '99Hand-Held Computers Can Be Better Smart CardsDirk Balfanz, Edward W. Felten
    USENIX Security '99Offline DelegationArne Helme, Tage Stabell-Kulø
    USENIX Security '99Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories Tse-Huong Choo
    USENIX Security '99Enforcing Well-Formed and Partially-Formed Transactions for UNIXDean Povey
    USENIX Security '99Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level SpecificationsR. Sekar, Prem UppuluriR. Sekar
    USENIX Security '99Building Intrusion-Tolerant ApplicationsThomas Wu, Michael Malkin, Dan Boneh
    USENIX Security '99Brute Force Attack on UNIX Passwords with SIMD ComputerGershon Kedem, Yuriko Ishihara
    USENIX Security '99Antigone: A Flexible Framework for Secure Group CommunicationPatrick McDaniel, Atul Prakash, Peter Honeyman
    USENIX Security '99A Secure Station for Network Monitoring and Control
    USENIX Security '99The Flask Security Architecture: System Support for Diverse Security PoliciesRay Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, Dave Andersen, Jay Lepreau
    USENIX Security '99A Study in Using Neural Networks for Anomaly and Misuse DetectionAnup K. Ghosh, Aaron Schwartzbard
    USENIX Security '99The Design of a Cryptographic Security ArchitecturePeter Gutmann
    USENIX Security '99Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0Alma Whitten, J. D. Tygar
    USENIX Security '99Jonah: Experience Implementing PKIX Reference FreewareMary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Macek, Ann Graham, Jim Wade, Tom Sandlin
    USENIX Security '99Scalable Access Control for Distributed Object SystemsDaniel F. Sterne, Gregg W. Tally, C. Durward McDonell, David L. Sherman, David L. Sames, Pierre X. Pasturel, E. John Sebes

Pages