


default search action
10th CCS 2003: Washington, DC, USA
- Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger:

Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003. ACM 2003, ISBN 1-58113-738-9
Keynote
- Rakesh Agrawal:

Privacy cognizant information systems. 1-
DOS protection
- Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld:

DoS protection for UDP-based protocols. 2-7 - William G. Morein, Angelos Stavrou

, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
Using graphic turing tests to counter automated DDoS attacks against web servers. 8-19 - Xinyuan Wang, Douglas S. Reeves:

Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. 20-29 - Cheng Jin, Haining Wang, Kang G. Shin:

Hop-count filtering: an effective defense against spoofed DDoS traffic. 30-41
Sensor networks
- Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:

A pairwise key pre-distribution scheme for wireless sensor networks. 42-51 - Donggang Liu, Peng Ning:

Establishing pairwise keys in distributed sensor networks. 52-61 - Sencun Zhu, Sanjeev Setia, Sushil Jajodia:

LEAP: efficient security mechanisms for large-scale distributed sensor networks. 62-72
- Makoto Murata

, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada:
XML access control using static analysis. 73-84 - Jason Crampton:

On permissions, inheritance and role hierarchies. 85-92 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:

Balancing confidentiality and efficiency in untrusted relational DBMSs. 93-102
Privacy/anonymity
- Ari Juels, Ronald L. Rivest, Michael Szydlo:

The blocker tag: selective blocking of RFID tags for consumer privacy. 103-111 - Brent R. Waters, Edward W. Felten, Amit Sahai:

Receiver anonymity via incomparable public keys. 112-121 - Luis von Ahn, Andrew Bortz, Nicholas J. Hopper:

k-anonymous message transmission. 122-130
Authentication and signature schemes
- Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel:

On the performance, feasibility, and use of forward-secure signatures. 131-144 - Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli:

Print signatures for document authentication. 145-154 - Jonathan Katz, Nan Wang:

Efficiency improvements for signature schemes with tight security reductions. 155-164 - William Aiello, John Ioannidis, Patrick D. McDaniel:

Origin authentication in interdomain routing. 165-178
Information warfare
- Peng Liu, Wanyu Zang:

Incentive-based modeling and inference of attacker intent, objectives, and strategies. 179-189 - Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley:

Monitoring and early warning for internet worms. 190-199 - Peng Ning, Dingbang Xu:

Learning attack strategies from intrusion alerts. 200-209
Cryptographic protocols/ network security
- Philip D. MacKenzie, Alina Oprea, Michael K. Reiter:

Automatic generation of two-party computations. 210-219 - Michael Backes, Birgit Pfitzmann, Michael Waidner

:
A composable cryptographic library with nested operations. 220-230 - Donggang Liu, Peng Ning, Kun Sun:

Efficient self-healing group key distribution with revocation capability. 231-240 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval

:
Security proofs for an efficient password-based key exchange. 241-250
Intrusion detection
- Christopher Krügel, Giovanni Vigna:

Anomaly detection of web-based attacks. 251-261 - Robin Sommer, Vern Paxson:

Enhancing byte-level network intrusion detection signatures with context. 262-271 - Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis:

Countering code-injection attacks with instruction-set randomization. 272-280 - Elena Gabriela Barrantes, David H. Ackley, Trek S. Palmer, Darko Stefanovic, Dino Dai Zovi:

Randomized instruction set emulation to disrupt binary code injection attacks. 281-289
Emerging applications
- Cullen Linn, Saumya K. Debray:

Obfuscation of executable code to improve resistance to static disassembly. 290-299 - Beverly Yang, Hector Garcia-Molina:

PPay: micropayments for peer-to-peer systems. 300-310 - Johannes Blömer, Martin Otto, Jean-Pierre Seifert:

A new CRT-RSA algorithm secure against bellcore attacks. 311-320
Analysis and verification
- Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler:

MECA: an extensible, expressive system and language for statically checking security properties. 321-334 - David A. Basin, Sebastian Mödersheim

, Luca Viganò:
CDiff: a new reduction technique for constraint-based analysis of security protocols. 335-344 - Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek:

Buffer overrun detection using linear programming and static analysis. 345-354 - Gene Itkis:

Cryptographic tamper evidence. 355-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














