


default search action
NDSS 2000: San Diego, California, USA
- Proceedings of the Network and Distributed System Security Symposium, NDSS 2000, San Diego, California, USA. The Internet Society 2000, ISBN 1-891562-07-X
Session 1: Software Assurance
- David A. Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. - K. Jain, R. Sekar:
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement.
Session 2: Group And Multicast Security
- Ohad Rodeh, Kenneth P. Birman, Danny Dolev:
Optimized Rekey for Group Communication Systems. - Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha:
An IPSec-based Host Architecture for Secure Internet Multicast.
Session 3: Panel - The Economics Of Security
Session 4: Protocols I
- Adrian Perrig, Dawn Xiaodong Song:
A First Step Towards the Automatic Generation of Security Protocols. - Yki Kortesniemi, Tero Hasu, Jonna Särs:
A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems. - Stephen T. Kent, Charles Lynn, Joanne Mikkelson, Karen Seo:
Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues.
BOF on Windows 2000 Security
Session 5: Protocols II
- Vitaly Shmatikov, John C. Mitchell:
Analysis of a Fair Exchange Protocol. - Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner:
Secure Password-Based Cipher Suite for TLS. - Hugo Krawczyk, Tal Rabin:
Chameleon Signatures.
Session 6: Intrusion Detection
- Magnus Almgren, Hervé Debar, Marc Dacier:
A Lightweight Tool for Detecting Web Server Attacks. - Joseph P. Loyall, Partha P. Pal, Richard E. Schantz, Franklin Webber:
Building Adaptive and Agile Applications Using Intrusion Detection and Response.
Session 7: Distributed Systems
- Deborah Shands, Richard Yee, Jay Jacobs, E. John Sebes:
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies. - Kirsten Hildrum:
Security of Encrypted rlogin Connections Created With Kerberos IV. - Marty Humphrey, Frederick Knabe, Adam Ferrari, Andrew S. Grimshaw:
Accountability and Control of Process Creation in Metasystems.
Session 8: Panel II - Red Teaming And Network Security

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.