10. CCS 2003:
Washington,
DC,
USA
Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger (Eds.):
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003.
ACM 2003, ISBN 1-58113-738-9 @proceedings{DBLP:conf/ccs/2003,
editor = {Sushil Jajodia and
Vijayalakshmi Atluri and
Trent Jaeger},
title = {Proceedings of the 10th ACM Conference on Computer and Communications
Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003},
booktitle = {ACM Conference on Computer and Communications Security},
publisher = {ACM},
year = {2003},
isbn = {1-58113-738-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Keynote
DOS protection
- Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld:
DoS protection for UDP-based protocols.
2-7
- William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
Using graphic turing tests to counter automated DDoS attacks against web servers.
8-19
- Xinyuan Wang, Douglas S. Reeves:
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.
20-29
- Cheng Jin, Haining Wang, Kang G. Shin:
Hop-count filtering: an effective defense against spoofed DDoS traffic.
30-41
Sensor networks
Access control
Privacy/anonymity
Authentication and signature schemes
- Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew McDaniel:
On the performance, feasibility, and use of forward-secure signatures.
131-144
- Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli:
Print signatures for document authentication.
145-154
- Jonathan Katz, Nan Wang:
Efficiency improvements for signature schemes with tight security reductions.
155-164
- William Aiello, John Ioannidis, Patrick Drew McDaniel:
Origin authentication in interdomain routing.
165-178
Information warfare
Cryptographic protocols/ network security
Intrusion detection
Emerging applications
Analysis and verification
- Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler:
MECA: an extensible, expressive system and language for statically checking security properties.
321-334
- David A. Basin, Sebastian Mödersheim, Luca Viganò:
CDiff: a new reduction technique for constraint-based analysis of security protocols.
335-344
- Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek:
Buffer overrun detection using linear programming and static analysis.
345-354
- Gene Itkis:
Cryptographic tamper evidence.
355-364
Copyright © Sun Mar 14 22:57:23 2010
by Michael Ley (ley@uni-trier.de)