![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
10th USENIX Security Symposium 2001: Washington, D.C., USA
- Dan S. Wallach:
10th USENIX Security Symposium, August 13-17, 2001, Washington, D.C., USA. USENIX 2001
Denial of Service
- Drew Dean, Adam Stubblefield:
Using Client Puzzles to Protect TLS. - David Moore, Geoffrey M. Voelker, Stefan Savage:
Inferring Internet Denial-of-Service Activity. - Thomer M. Gil, Massimiliano Poletto:
MULTOPS: A Data-Structure for Bandwidth Attack Detection.
Hardware
- Peter Gutmann:
Data Remanence in Semiconductor Devices. - Michael Frantzen, Michael Shuey:
StackGhost: Hardware Facilitated Stack Protection. - Mark Lindemann, Sean W. Smith:
Improving DES Coprocessor Throughput for Short Operations.
Firewalls/Intrusion Detection
- Avishai Wool:
Architecting the Lumeta Firewall Analyzer. - Peter M. Gleitz, Steven M. Bellovin:
Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host. - Mark Handley, Vern Paxson, Christian Kreibich:
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics.
SDMI/DMCA
- Scott Craver, Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, Edward W. Felten:
Reading Between the Lines: Lessons from the SDMI Challenge.
Operating Systems
- Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats.
- Steven J. Bauer, Nissanka Bodhi Priyantha:
Secure Data Deletion for Linux File Systems. - Crispin Cowan, Steve Beattie, Chris Wright, Greg Kroah-Hartman:
RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities.
Managing Code
- David Larochelle, David Evans:
Statically Detecting Likely Buffer Overflow Vulnerabilities. - Crispin Cowan, Matt Barringer, Steve Beattie, Greg Kroah-Hartman, Michael Frantzen, Jamie Lokier:
FormatGuard: Automatic Protection From printf Format String Vulnerabilities. - Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, David A. Wagner:
Detecting Format String Vulnerabilities with Type Qualifiers.
Authorization
- Jude T. Regan, Christian Damsgaard Jensen:
Capability File Names: Separating Authorisation From User Management in an Internet File System. - Olga Kornievskaia, Peter Honeyman, Bill Doster, Kevin Coffman:
Kerberized Credential Translation: A Solution to Web Access Control. - Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster:
The Dos and Don'ts of Client Authentication on the Web.
Key Management
- Naomaru Itoi:
SC-CFS: Smartcard Secured Cryptographic File System. - Lukasz Opyrchal, Atul Prakash:
Secure Distribution of Events in Content-Based Publish Subscribe Systems. - Dan Boneh, Xuhua Ding, Gene Tsudik, Chi-Ming Wong:
A Method for Fast Revocation of Public Key Certificates and Security Capabilities.
Math Attacks!
- Charlie Kaufman, Radia J. Perlman:
PDM: A New Strong Password-Based Protocol. - Niels Provos:
Defending Against Statistical Steganalysis. - Dawn Xiaodong Song, David A. Wagner, Xuqing Tian:
Timing Analysis of Keystrokes and Timing Attacks on SSH.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.