


default search action
11th CCS 2004: Washington, DC, USA
- Vijayalakshmi Atluri, Birgit Pfitzmann, Patrick D. McDaniel:

Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004. ACM 2004, ISBN 1-58113-961-6 - John D. McLean:

Trusting a trusted system. 1
Network intrusions
- Holger Dreger, Anja Feldmann

, Vern Paxson, Robin Sommer:
Operational experiences with high-volume network intrusion detection. 2-11 - Kirill Levchenko, Ramamohan Paturi, George Varghese:

On the difficulty of scalably detecting network attacks. 12-20 - Giovanni Vigna, William K. Robertson, Davide Balzarotti:

Testing network-based intrusion detection signatures using mutant exploits. 21-30 - Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon

:
Payload attribution via hierarchical bloom filters. 31-41
Access control
- Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara:

On mutually-exclusive roles and separation of duty. 42-51 - Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell:

KNOW Why your access was denied: regulating feedback for usable security. 52-61 - Mahesh V. Tripunitara, Ninghui Li:

Comparing the expressive power of access control models. 62-71
Applied cryptography
- Tadayoshi Kohno:

Attacking and repairing the winZip encryption scheme. 72-81 - Xavier Boyen:

Reusable cryptographic fuzzy extractors. 82-91 - David A. Wagner:

Cryptanalysis of a provably secure CRT-RSA algorithm. 92-97
Network security
- Neil Daswani, Hector Garcia-Molina:

Pong-cache poisoning in GUESS. 98-109 - Kevin Borders, Atul Prakash

:
Web tap: detecting covert web traffic. 110-120 - Adam J. O'Donnell, Harish Sethu:

On achieving software diversity for improved network security using distributed coloring algorithms. 121-131
Credentials
- Ernest F. Brickell, Jan Camenisch, Liqun Chen

:
Direct anonymous attestation. 132-145 - Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons

:
Concealing complex policies with hidden credentials. 146-157 - Shouhuai Xu, Moti Yung:

k-anonymous secret handshakes with reusable credentials. 158-167 - Dan Boneh, Hovav Shacham:

Group signatures with verifier-local revocation. 168-177
Information flow
- Serdar Cabuk, Carla E. Brodley, Clay Shields:

IP covert timing channels: design and detection. 178-187 - David P. Woodruff, Jessica Staddon:

Private inference control. 188-197 - Stephen Chong, Andrew C. Myers:

Security policies for downgrading. 198-209
Privacy
- David Molnar, David A. Wagner:

Privacy and security in library RFID: issues, practices, and architectures. 210-219 - Philippe Golle, Ari Juels:

Parallel mixing. 220-226 - Michael K. Reiter, XiaoFeng Wang:

Fragile mixing. 227-235
Puzzles and users
- Volker Roth, Kai Richter, Rene Freidinger:

A PIN-entry method resilient against shoulder surfing. 236-245 - Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten:

New client puzzle outsourcing techniques for DoS resistance. 246-256 - XiaoFeng Wang, Michael K. Reiter:

Mitigating bandwidth-exhaustion attacks using congestion puzzles. 257-267
Applications of formal methods
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:

Verifying policy-based security for web services. 268-277 - Stéphanie Delaune, Florent Jacquemard:

A decision procedure for the verification of security protocols with explicit destructors. 278-287 - Hao Chen, Jonathan S. Shapiro:

Using build-integrated static checking to preserve correctness invariants. 288-297
Operating systems security
- Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:

On the effectiveness of address-space randomization. 298-307 - Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn:

Attestation-based policy enforcement for remote access. 308-317 - Debin Gao

, Michael K. Reiter, Dawn Xiaodong Song:
Gray-box extraction of execution graphs for anomaly detection. 318-329
Cryptographic tools
- Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung:

The dual receiver cryptosystem and its applications. 330-343 - Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:

Versatile padding schemes for joint signature and encryption. 344-353 - Danfeng Yao

, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. 354-363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














