default search action
11th CCS 2004: Washington, DC, USA
- Vijayalakshmi Atluri, Birgit Pfitzmann, Patrick D. McDaniel:
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004. ACM 2004, ISBN 1-58113-961-6 - John D. McLean:
Trusting a trusted system. 1
Network intrusions
- Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer:
Operational experiences with high-volume network intrusion detection. 2-11 - Kirill Levchenko, Ramamohan Paturi, George Varghese:
On the difficulty of scalably detecting network attacks. 12-20 - Giovanni Vigna, William K. Robertson, Davide Balzarotti:
Testing network-based intrusion detection signatures using mutant exploits. 21-30 - Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon:
Payload attribution via hierarchical bloom filters. 31-41
Access control
- Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara:
On mutually-exclusive roles and separation of duty. 42-51 - Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell:
KNOW Why your access was denied: regulating feedback for usable security. 52-61 - Mahesh V. Tripunitara, Ninghui Li:
Comparing the expressive power of access control models. 62-71
Applied cryptography
- Tadayoshi Kohno:
Attacking and repairing the winZip encryption scheme. 72-81 - Xavier Boyen:
Reusable cryptographic fuzzy extractors. 82-91 - David A. Wagner:
Cryptanalysis of a provably secure CRT-RSA algorithm. 92-97
Network security
- Neil Daswani, Hector Garcia-Molina:
Pong-cache poisoning in GUESS. 98-109 - Kevin Borders, Atul Prakash:
Web tap: detecting covert web traffic. 110-120 - Adam J. O'Donnell, Harish Sethu:
On achieving software diversity for improved network security using distributed coloring algorithms. 121-131
Credentials
- Ernest F. Brickell, Jan Camenisch, Liqun Chen:
Direct anonymous attestation. 132-145 - Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons:
Concealing complex policies with hidden credentials. 146-157 - Shouhuai Xu, Moti Yung:
k-anonymous secret handshakes with reusable credentials. 158-167 - Dan Boneh, Hovav Shacham:
Group signatures with verifier-local revocation. 168-177
Information flow
- Serdar Cabuk, Carla E. Brodley, Clay Shields:
IP covert timing channels: design and detection. 178-187 - David P. Woodruff, Jessica Staddon:
Private inference control. 188-197 - Stephen Chong, Andrew C. Myers:
Security policies for downgrading. 198-209
Privacy
- David Molnar, David A. Wagner:
Privacy and security in library RFID: issues, practices, and architectures. 210-219 - Philippe Golle, Ari Juels:
Parallel mixing. 220-226 - Michael K. Reiter, XiaoFeng Wang:
Fragile mixing. 227-235
Puzzles and users
- Volker Roth, Kai Richter, Rene Freidinger:
A PIN-entry method resilient against shoulder surfing. 236-245 - Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten:
New client puzzle outsourcing techniques for DoS resistance. 246-256 - XiaoFeng Wang, Michael K. Reiter:
Mitigating bandwidth-exhaustion attacks using congestion puzzles. 257-267
Applications of formal methods
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
Verifying policy-based security for web services. 268-277 - Stéphanie Delaune, Florent Jacquemard:
A decision procedure for the verification of security protocols with explicit destructors. 278-287 - Hao Chen, Jonathan S. Shapiro:
Using build-integrated static checking to preserve correctness invariants. 288-297
Operating systems security
- Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
On the effectiveness of address-space randomization. 298-307 - Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn:
Attestation-based policy enforcement for remote access. 308-317 - Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
Gray-box extraction of execution graphs for anomaly detection. 318-329
Cryptographic tools
- Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung:
The dual receiver cryptosystem and its applications. 330-343 - Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:
Versatile padding schemes for joint signature and encryption. 344-353 - Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. 354-363
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.