default search action
NDSS 1999: San Diego, California, USA
- Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA. The Internet Society 1999, ISBN 1-891562-04-5
Session 1: User Authentication And Public Key Cryptography
- Radia J. Perlman, Charlie Kaufman:
Secure Password-Based Protocol for Downloading a Private Key. - Thomas D. Wu:
A Real-World Analysis of Kerberos Password Security. - Christian Gilmore, David P. Kormann, Aviel D. Rubin:
Secure Remote Access to an Internal Web Server.
Session 2: Panel - Security And The User
- Mary Ellen Zurko:
User-Centered Security. - Mark S. Ackerman:
Usability and Security.
Session 3: Cryptographic Protocols
- Michael Malkin, Thomas D. Wu, Dan Boneh:
Experimenting with Shared Generation of RSA Keys. - Mike Just, Paul C. van Oorschot:
Addressing the Problem of Undetected Signature Key Compromise. - Andreu Riera, Joan Borrell:
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes.
Session 4: Panel - Securing The Internet's Exterior Routing Infrastructure
- Sandra L. Murphy:
BGP Vulnerabilities and Security Options. - Charles Lynn:
Secure Border Gateway Protocol (S-BGP). - Tony Li:
BGP Origin Authentication. - Curtis Villamizer:
Improving Internet Routing Robustness.
Session 5: Policy And Trust Management
- Pekka Nikander, Jonna Partanen:
Distributed Policy Management for JDK 1.2. - Fabian Monrose, Peter Wyckoff, Aviel D. Rubin:
Distributed Execution with Remote Audit. - Audun Jøsang:
An Algebra for Assessing Trust in Certification Chains.
Session 6: Panel - A Network Security Research Agenda
- Steven M. Bellovin:
Why Do We Need More Research? - Stephen T. Kent:
R&D Challenges: Notes from the "Trust in Cyberspace" Report. - Hilarie K. Orman:
Perspectives on Progress and Directions for Network Security Research.
Session 7: Network Infrastructure Protection
- Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli, Pierangela Samarati:
PGRIP: PNNI Global Routing Infrastructure Protection. - Ari Juels, John G. Brainard:
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
Session 8: Panel - Ipsec: Friend Or Foe
- Rodney Thayer:
Benefits of IPsec. - Bob Braden:
Arguments Against IPSEC. - Steven M. Bellovin:
Transport-Friendly ESP.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.