Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2002.bht:"
@inproceedings{DBLP:conf/ccs/AielloBBIRCK02, author = {William Aiello and Steven M. Bellovin and Matt Blaze and John Ioannidis and Omer Reingold and Ran Canetti and Angelos D. Keromytis}, editor = {Vijayalakshmi Atluri}, title = {Efficient, DoS-resistant, secure key exchange for internet protocols}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {48--58}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586118}, doi = {10.1145/586110.586118}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AielloBBIRCK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AmmannWK02, author = {Paul Ammann and Duminda Wijesekera and Saket Kaushik}, editor = {Vijayalakshmi Atluri}, title = {Scalable, graph-based network vulnerability analysis}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {217--224}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586140}, doi = {10.1145/586110.586140}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AmmannWK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellaPM02, author = {Giampaolo Bella and Lawrence C. Paulson and Fabio Massacci}, editor = {Vijayalakshmi Atluri}, title = {The verification of an industrial payment protocol: the {SET} purchase phase}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {12--20}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586113}, doi = {10.1145/586110.586113}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellaPM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareKN02, author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre}, editor = {Vijayalakshmi Atluri}, title = {Authenticated encryption in {SSH:} provably fixing the {SSH} binary packet protocol}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {1--11}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586112}, doi = {10.1145/586110.586112}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellareKN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BertinoCF02, author = {Elisa Bertino and Barbara Carminati and Elena Ferrari}, editor = {Vijayalakshmi Atluri}, title = {A temporal key management scheme for secure broadcasting of {XML} documents}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {31--40}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586116}, doi = {10.1145/586110.586116}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BertinoCF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BonehG02, author = {Dan Boneh and Philippe Golle}, editor = {Vijayalakshmi Atluri}, title = {Almost entirely correct mixing with applications to voting}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {68--77}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586121}, doi = {10.1145/586110.586121}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BonehG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CachinKLS02, author = {Christian Cachin and Klaus Kursawe and Anna Lysyanskaya and Reto Strobl}, editor = {Vijayalakshmi Atluri}, title = {Asynchronous verifiable secret sharing and proactive cryptosystems}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {88--97}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586124}, doi = {10.1145/586110.586124}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CachinKLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CamenischH02, author = {Jan Camenisch and Els Van Herreweghen}, editor = {Vijayalakshmi Atluri}, title = {Design and implementation of the \emph{idemix} anonymous credential system}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {21--30}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586114}, doi = {10.1145/586110.586114}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CamenischH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Camp02, author = {L. Jean Camp}, editor = {Vijayalakshmi Atluri}, title = {{DRM:} doesn't realy mean digital copyright management}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {78--87}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586122}, doi = {10.1145/586110.586122}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Camp02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenW02, author = {Hao Chen and David A. Wagner}, editor = {Vijayalakshmi Atluri}, title = {{MOPS:} an infrastructure for examining security properties of software}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {235--244}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586142}, doi = {10.1145/586110.586142}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DamianiVPSV02, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Stefano Paraboschi and Pierangela Samarati and Fabio Violante}, editor = {Vijayalakshmi Atluri}, title = {A reputation-based approach for choosing reliable resources in peer-to-peer networks}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {207--216}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586138}, doi = {10.1145/586110.586138}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DamianiVPSV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DaswaniG02, author = {Neil Daswani and Hector Garcia{-}Molina}, editor = {Vijayalakshmi Atluri}, title = {Query-flood DoS attacks in gnutella}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {181--192}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586136}, doi = {10.1145/586110.586136}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DaswaniG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DengZB02, author = {Robert H. Deng and Jianying Zhou and Feng Bao}, editor = {Vijayalakshmi Atluri}, title = {Defending against redirect attacks in mobile {IP}}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {59--67}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586120}, doi = {10.1145/586110.586120}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DengZB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EdwardsJZ02, author = {Antony Edwards and Trent Jaeger and Xiaolan Zhang}, editor = {Vijayalakshmi Atluri}, title = {Runtime verification of authorization hook placement for the linux security modules framework}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {225--234}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586141}, doi = {10.1145/586110.586141}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EdwardsJZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EschenauerG02, author = {Laurent Eschenauer and Virgil D. Gligor}, editor = {Vijayalakshmi Atluri}, title = {A key-management scheme for distributed sensor networks}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {41--47}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586117}, doi = {10.1145/586110.586117}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EschenauerG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FreedmanM02, author = {Michael J. Freedman and Robert Tappan Morris}, editor = {Vijayalakshmi Atluri}, title = {Tarzan: a peer-to-peer anonymizing network layer}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {193--206}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586137}, doi = {10.1145/586110.586137}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FreedmanM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GassendCDD02, author = {Blaise Gassend and Dwaine E. Clarke and Marten van Dijk and Srinivas Devadas}, editor = {Vijayalakshmi Atluri}, title = {Silicon physical random functions}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {148--160}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586132}, doi = {10.1145/586110.586132}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GassendCDD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Goodrich02, author = {Michael T. Goodrich}, editor = {Vijayalakshmi Atluri}, title = {Efficient packet marking for large-scale {IP} traceback}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {117--126}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586128}, doi = {10.1145/586110.586128}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Goodrich02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuraES02, author = {Nils Gura and Hans Eberle and Sheueling Chang Shantz}, editor = {Vijayalakshmi Atluri}, title = {Generic implementations of elliptic curve cryptography using partial reduction}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {108--116}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586126}, doi = {10.1145/586110.586126}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuraES02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MittalV02, author = {Vishal Mittal and Giovanni Vigna}, editor = {Vijayalakshmi Atluri}, title = {Sensor-based intrusion detection for intra-domain distance-vector routing}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {127--137}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586129}, doi = {10.1145/586110.586129}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MittalV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NingCR02, author = {Peng Ning and Yun Cui and Douglas S. Reeves}, editor = {Vijayalakshmi Atluri}, title = {Constructing attack scenarios through correlation of intrusion alerts}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {245--254}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586144}, doi = {10.1145/586110.586144}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NingCR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PinkasS02, author = {Benny Pinkas and Tomas Sander}, editor = {Vijayalakshmi Atluri}, title = {Securing passwords against dictionary attacks}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {161--170}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586133}, doi = {10.1145/586110.586133}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PinkasS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Rogaway02, author = {Phillip Rogaway}, editor = {Vijayalakshmi Atluri}, title = {Authenticated-encryption with associated-data}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {98--107}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586125}, doi = {10.1145/586110.586125}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Rogaway02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SekarGFSTYZ02, author = {R. Sekar and Ajay Gupta and J. Frullo and T. Shanbhag and A. Tiwari and H. Yang and S. Zhou}, editor = {Vijayalakshmi Atluri}, title = {Specification-based anomaly detection: a new approach for detecting network intrusions}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {265--274}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586146}, doi = {10.1145/586110.586146}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SekarGFSTYZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WagnerS02, author = {David A. Wagner and Paolo Soto}, editor = {Vijayalakshmi Atluri}, title = {Mimicry attacks on host-based intrusion detection systems}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {255--264}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586145}, doi = {10.1145/586110.586145}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WagnerS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WijesekeraJ02, author = {Duminda Wijesekera and Sushil Jajodia}, editor = {Vijayalakshmi Atluri}, title = {Policy algebras for access control the predicate case}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {171--180}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586134}, doi = {10.1145/586110.586134}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WijesekeraJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZouGT02, author = {Cliff Changchun Zou and Weibo Gong and Donald F. Towsley}, editor = {Vijayalakshmi Atluri}, title = {Code red worm propagation modeling and analysis}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {138--147}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586130}, doi = {10.1145/586110.586130}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZouGT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2002, editor = {Vijayalakshmi Atluri}, title = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, publisher = {{ACM}}, year = {2002}, url = {http://dl.acm.org/citation.cfm?id=586110}, isbn = {1-58113-612-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.