


default search action
NDSS 1998: San Diego, California, USA
- Proceedings of the Network and Distributed System Security Symposium, NDSS 1998, San Diego, California, USA. The Internet Society 1998, ISBN 1-891562-01-0
Session 1: Internet And Intranet
- David W. Chadwick, Andrew J. Young:
Enabling the Internet White Pages Service - the Directory Guardian. - Dan M. Nessett, Polar Humenn:
The Multilayer Firewall. - Kan Zhang:
Efficient Protocols for Signing Routing Messages.
Session 2: Panel - Implementation Issues For Electronic Commerce
- Donald E. Eastlake III:
Some Tips. - Gary McGraw:
Weak links in e-commerce security: examples from the field. - B. Clifford Neuman:
Implementation Issues for E-Commerce.
Session 3: All Optical Networks Security
- Muriel Médard, Douglas Marquis, Stephen R. Chinn:
Attack Detection Methods for All-Optical Networks. - Ruth Bergman, Muriel Médard, Serena Chan:
Distributed Algorithms for Attack Localization in All-Optical Networks.
Session 4: Protocols
- Detlef Hühnlein:
Credential Management and Secure Single Login for SPKM. - Mike Just:
Some Timestamping Protocol Failures. - Thomas D. Wu:
The Secure Remote Password Protocol.
Dinner Banquet: Lucent's Entry Into Network Security
- Howard M. Gittleson:
Lucent's Entry Into Network Security.
Session 5: Mobile Agents
- Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán:
On the Problem of Trust in Mobile Agent Systems. - Li Gong, Roland Schemers:
Implementing Protection Domains in the JavaTM Development Kit 1.2.
Session 6: Panel - Trust Management
- Bob Blakley:
Le Nozze di Nomen. - Blair Dillaway:
Trust Management and Internet Client Security.
Session 7: Traffic Analysis And Secure Bootstrapping
- Phillip A. Porras, Alfonso Valdes:
Live Traffic Analysis of TCP/IP Gateways. - William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith:
Automated Recovery in a Secure Bootstrap Process.
Session 8: Panel - Experience With Firewalls And IPsec
- Naganand Doraswamy:
VPN and IPsec. - Cheryl Madson:
An Intermediate System's View of IPSEC. - Dan McDonald:
What Will Probably Happen.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.