![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
9th USENIX Security Symposium 2000: Denver, Colorado, USA
- Steven M. Bellovin, Greg Rose:
9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000. USENIX Association 2000 - Jonathan Katz, Bruce Schneier:
A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols. - Michael Brown, Donny Cheung, Darrel Hankerson, Julio César López-Hernández, Michael Kirkup, Alfred Menezes:
PGP in Constrained Wireless Devices. - Matt Curtin:
Shibboleth: Private Mailing List Manager. - Robert Stone:
CenterTrack: An IP Overlay Network for Tracking DoS Floods. - Yongguang Zhang, Bikramjit Singh:
A Multi-Layer IPSEC Protocol. - Matthew Smart, G. Robert Malan, Farnam Jahanian:
Defeating TCP/IP Stack Fingerprinting. - Calvin Ko, Timothy Fraser, Lee Badger, Douglas Kilpatrickv:
Detecting and Countering System Intrusions Using Software Wrappers. - Yin Zhang, Vern Paxson:
Detecting Backdoors. - Yin Zhang, Vern Paxson:
Detecting Stepping Stones. - Anil Somayaji, Stephanie Forrest:
Automated Response Using System-Call Delay. - Peter Gutmann:
An Open-Source Cryptographic Coprocessor. - Naomaru Itoi:
Secure Coprocessor Integration with Kerberos V5. - John Scott Robin, Cynthia E. Irvine:
Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor. - Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor:
Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System. - Markus G. Kuhn:
Probabilistic Counting of Large Digital Signature Collections. - Josyula R. Rao, Pankaj Rohatgi:
Can Pseudonymity Really Guarantee Privacy? - Anurag Acharya, Mandar Raje:
MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications. - Leendert van Doorn:
A Secure Java Virtual Machine. - Niels Provos:
Encrypting Virtual Memory. - Rachna Dhamija, Adrian Perrig:
Deja Vu-A User Study: Using Images for Authentication.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.