


default search action
9th USENIX Security Symposium 2000: Denver, Colorado, USA
- Steven M. Bellovin, Greg Rose:
9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000. USENIX Association 2000 - Jonathan Katz, Bruce Schneier:
A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols. - Michael Brown, Donny Cheung, Darrel Hankerson, Julio César López-Hernández, Michael Kirkup, Alfred Menezes:
PGP in Constrained Wireless Devices. - Matt Curtin:
Shibboleth: Private Mailing List Manager. - Robert Stone:
CenterTrack: An IP Overlay Network for Tracking DoS Floods. - Yongguang Zhang, Bikramjit Singh:
A Multi-Layer IPSEC Protocol. - Matthew Smart, G. Robert Malan, Farnam Jahanian:
Defeating TCP/IP Stack Fingerprinting. - Calvin Ko, Timothy Fraser, Lee Badger, Douglas Kilpatrickv:
Detecting and Countering System Intrusions Using Software Wrappers. - Yin Zhang, Vern Paxson:
Detecting Backdoors. - Yin Zhang, Vern Paxson:
Detecting Stepping Stones. - Anil Somayaji, Stephanie Forrest:
Automated Response Using System-Call Delay. - Peter Gutmann:
An Open-Source Cryptographic Coprocessor. - Naomaru Itoi:
Secure Coprocessor Integration with Kerberos V5. - John Scott Robin, Cynthia E. Irvine:
Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor. - Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor:
Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System. - Markus G. Kuhn:
Probabilistic Counting of Large Digital Signature Collections. - Josyula R. Rao, Pankaj Rohatgi:
Can Pseudonymity Really Guarantee Privacy? - Anurag Acharya, Mandar Raje:
MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications. - Leendert van Doorn:
A Secure Java Virtual Machine. - Niels Provos:
Encrypting Virtual Memory. - Rachna Dhamija, Adrian Perrig:
Deja Vu-A User Study: Using Images for Authentication.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.