default search action
10th CCS 2003: Washington, DC, USA
- Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger:
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003. ACM 2003, ISBN 1-58113-738-9
Keynote
- Rakesh Agrawal:
Privacy cognizant information systems. 1-
DOS protection
- Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld:
DoS protection for UDP-based protocols. 2-7 - William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
Using graphic turing tests to counter automated DDoS attacks against web servers. 8-19 - Xinyuan Wang, Douglas S. Reeves:
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. 20-29 - Cheng Jin, Haining Wang, Kang G. Shin:
Hop-count filtering: an effective defense against spoofed DDoS traffic. 30-41
Sensor networks
- Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A pairwise key pre-distribution scheme for wireless sensor networks. 42-51 - Donggang Liu, Peng Ning:
Establishing pairwise keys in distributed sensor networks. 52-61 - Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP: efficient security mechanisms for large-scale distributed sensor networks. 62-72
- Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada:
XML access control using static analysis. 73-84 - Jason Crampton:
On permissions, inheritance and role hierarchies. 85-92 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Balancing confidentiality and efficiency in untrusted relational DBMSs. 93-102
Privacy/anonymity
- Ari Juels, Ronald L. Rivest, Michael Szydlo:
The blocker tag: selective blocking of RFID tags for consumer privacy. 103-111 - Brent R. Waters, Edward W. Felten, Amit Sahai:
Receiver anonymity via incomparable public keys. 112-121 - Luis von Ahn, Andrew Bortz, Nicholas J. Hopper:
k-anonymous message transmission. 122-130
Authentication and signature schemes
- Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel:
On the performance, feasibility, and use of forward-secure signatures. 131-144 - Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli:
Print signatures for document authentication. 145-154 - Jonathan Katz, Nan Wang:
Efficiency improvements for signature schemes with tight security reductions. 155-164 - William Aiello, John Ioannidis, Patrick D. McDaniel:
Origin authentication in interdomain routing. 165-178
Information warfare
- Peng Liu, Wanyu Zang:
Incentive-based modeling and inference of attacker intent, objectives, and strategies. 179-189 - Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley:
Monitoring and early warning for internet worms. 190-199 - Peng Ning, Dingbang Xu:
Learning attack strategies from intrusion alerts. 200-209
Cryptographic protocols/ network security
- Philip D. MacKenzie, Alina Oprea, Michael K. Reiter:
Automatic generation of two-party computations. 210-219 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
A composable cryptographic library with nested operations. 220-230 - Donggang Liu, Peng Ning, Kun Sun:
Efficient self-healing group key distribution with revocation capability. 231-240 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval:
Security proofs for an efficient password-based key exchange. 241-250
Intrusion detection
- Christopher Krügel, Giovanni Vigna:
Anomaly detection of web-based attacks. 251-261 - Robin Sommer, Vern Paxson:
Enhancing byte-level network intrusion detection signatures with context. 262-271 - Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis:
Countering code-injection attacks with instruction-set randomization. 272-280 - Elena Gabriela Barrantes, David H. Ackley, Trek S. Palmer, Darko Stefanovic, Dino Dai Zovi:
Randomized instruction set emulation to disrupt binary code injection attacks. 281-289
Emerging applications
- Cullen Linn, Saumya K. Debray:
Obfuscation of executable code to improve resistance to static disassembly. 290-299 - Beverly Yang, Hector Garcia-Molina:
PPay: micropayments for peer-to-peer systems. 300-310 - Johannes Blömer, Martin Otto, Jean-Pierre Seifert:
A new CRT-RSA algorithm secure against bellcore attacks. 311-320
Analysis and verification
- Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler:
MECA: an extensible, expressive system and language for statically checking security properties. 321-334 - David A. Basin, Sebastian Mödersheim, Luca Viganò:
CDiff: a new reduction technique for constraint-based analysis of security protocols. 335-344 - Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek:
Buffer overrun detection using linear programming and static analysis. 345-354 - Gene Itkis:
Cryptographic tamper evidence. 355-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.