Search Results
2. A Secure Active Network Environment Architecture: Realization in SwitchWare
3. KeyNote: Trust Management for Public-Key Infrastructures
4. Safety and Security of Programmable Network Infrastructures
5. The SwitchWare Active Network Architecture
6. A Secure Plan
7. Implementing a Distributed Firewall
8. Scalable Resource Control in Active Networks
9. Secure Quality of Service Handling: SQoSH
10. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols
11. Offline Micropayments without Trusted Hardware
12. The Price of Safety in an Active Network
13. A Secure PLAN (Extended Version)
14. A Study of the Relative Costs of Network Security Protocols
15. Designing an Embedded Firewall/VPN Gateway
16. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
17. Fileteller: Paying and Getting Paid for File Storage
18. Requirements for Scalable Access Control and Security Management Architectures
19. Secure Overlay Services
20. Trust Management for IPsec
21. Using Overlays to Improve Network Security
22. xPF: Packet Filtering for Low-Cost Network Monitoring
23. Accelerating Application-Level Security Protocols
24. A Cooperative Immunization System for an Untrusting Internet
25. A Holistic Approach to Service Survivability
26. A Holistic Approach to Service Survivability
27. A Network Worm Vaccine Architecture
28. A Secure PLAN
29. Countering Code Injection Attacks With Instruction Set Randomization
30. Countering Network Worms Through Automatic Patch Generation
31. Design and Implementation of Virtual Private Services
32. Drop-in Security for Distributed and Portable Computing Elements
33. EasyVPN: IPsec Remote Access Made Easy
34. Experience with the KeyNote Trust Management System: Applications and Future Directions
35. Managing Access Control in Large Scale Heterogeneous Networks
36. One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses
37. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec
38. Secure and Flexible Global File Sharing
39. SOS: An Architecture for Mitigating DDoS Attacks
40. Tagging Data In The Network Stack: mbuf tags
41. TAPI: Transactions for Accessing Public Infrastructure
42. The Design of the OpenBSD Cryptographic Framework
43. The STRONGMAN Architecture
44. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers
45. WebDAVA: An Administrator-Free Approach To Web File-Sharing
46. WebSOS: Protecting Web Servers From DDoS Attacks
47. A Pay-per-Use DoS Protection Mechanism For the Web
48. Building a Reactive Immune System for Software Services
49. CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
50. Collaborative Distributed Intrusion Detection
51. Dealing with System Monocultures
52. Elastic Block Ciphers
53. Elastic Block Ciphers: The Feistel Cipher Case
54. Exploiting the Structure in DHT Overlays for DoS Protection
55. Hydan: Hiding Information in Program Binaries
56. Just Fast Keying: Key Agreement in a Hostile Internet
57. "Patch-on-Demand" Saves Even More Time?
58. Recursive Sandboxes: Extending Systrace To Empower Applications
59. Remotely Keyed CryptoGraphics - Secure Remote Display Access Using (Mostly) Untrusted Hardware - Extended Version
60. Secret Key Cryptography Using Graphics Cards
61. SQLrand: Preventing SQL Injection Attacks
62. The Dual Receiver Cryptogram and Its Applications
63. Using Execution Transactions To Recover From Buffer Overflow Attacks
64. Action Amplification: A New Approach To Scalable Administration
65. Adding a Flow-Oriented Paradigm to Commodity Operating Systems
66. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks
67. A General Analysis of the Security of Elastic Block Ciphers
68. An Email Worm Vaccine Architecture
69. Application Communities: Using Monoculture for Dependability
70. A Repeater Encryption Unit for IPv4 and IPv6
71. Building a Reactive Immune System for Software Services
72. Conversion and Proxy Functions for Symmetric Key Ciphers
73. Countering DoS Attacks With Stateless Multipath Overlays
74. Countering Network Worms Through Automatic Patch Generation
75. CryptoGraphics: Secret Key Cryptography Using Graphics Cards
76. Detecting Targeted Attacks Using Shadow Honeypots
77. e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
78. FLIPS: Hybrid Adaptive Intrusion Prevention
79. FlowPuter: A Cluster Architecture Unifying Switch, Server and Storage Processing
80. gore: Routing-Assisted Defense Against DDoS Attacks
81. MOVE: An End-to-End Solution To Network Denial of Service
82. On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses
83. PachyRand: SQL Randomization for the PostgreSQL JDBC Driver
84. Remotely Keyed Cryptographics: Secure Remote Display Access Using (Mostly) Untrusted Hardware
85. Speculative Virtual Verification: Policy-Constrained Speculative Execution
86. The Bandwidth Exchange Architecture
87. The Case for Crypto Protocol Awareness Inside the OS Kernel
88. The Effect of DNS Delays on Worm Propagation in an IPv6 Internet
89. The Pseudorandomness of Elastic Block Ciphers
90. Towards Collaborative Security and P2P Intrusion Detection
91. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks
92. A Case for P2P Delivery of Paid Content
93. Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization
94. Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation
95. Conversion Functions for Symmetric Key Ciphers
96. Countering DDoS Attacks with Multi-Path Overlay Networks
97. Dark Application Communities
98. Execution transactions for defending against software failures: use and evaluation
99. LinkWidth: A Method to measure Link Capacity and Available Bandwidth Using Single-End Probes
100. Low Latency Anonymity with Mix Rings
- « Previous
- Next »
- 1
- 2
- 3