Search Results
2. Worm propagation strategies in an IPv6 Internet
3. WebSOS: Protecting Web Servers From DDoS Attacks
4. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks
5. WebDAVA: An Administrator-Free Approach To Web File-Sharing
6. W3Bcrypt: Encryption as a Stylesheet
7. W3Bcrypt: Encryption as a Stylesheet
8. Voice-over-IP Security: Research and Practice
9. Voice over IP: Risks, Threats and Vulnerabilities
10. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
11. Using Rescue Points to Navigate Software Recovery
12. Using Overlays to Improve Network Security
13. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers
14. Using Execution Transactions To Recover From Buffer Overflow Attacks
15. Trust Management for IPsec
16. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
17. Towards Collaborative Security and P2P Intrusion Detection
18. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation
19. Towards a Forensic Analysis for Multimedia Communication Services
20. The SwitchWare Active Network Architecture
21. The STRONGMAN Architecture
22. The SPARCHS Project: Hardware Support for Software Security
23. The Security of Elastic Block Ciphers Against Key-Recovery Attacks
24. The Pseudorandomness of Elastic Block Ciphers
25. The Price of Safety in an Active Network
26. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security
27. The Efficient Dual Receiver Cryptosystem and Its Applications
28. The Effect of DNS Delays on Worm Propagation in an IPv6 Internet
29. The Dual Receiver Cryptogram and Its Applications
30. The Design of the OpenBSD Cryptographic Framework
31. The Case for Crypto Protocol Awareness Inside the OS Kernel
32. The Bandwidth Exchange Architecture
33. TAPI: Transactions for Accessing Public Infrastructure
34. Taming the Devil: Techniques for Evaluating Anonymized Network Data
35. Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking
36. Tagging Data In The Network Stack: mbuf tags
37. STAND: Sanitization Tool for ANomaly Detection
38. SSARES: Secure Searchable Automated Remote Email Storage
39. SQLrand: Preventing SQL Injection Attacks
40. Speculative Virtual Verification: Policy-Constrained Speculative Execution
41. Speculative Execution as an Operating System Service
42. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
43. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
44. SOS: An Architecture for Mitigating DDoS Attacks
45. Software Self-Healing Using Collaborative Application Communities
46. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization
47. Shadow Honeypots
48. Self-Healing Multitier Architectures Using Cascading Rescue Points
49. Securing MANET Multicast Using DIPLOMA
50. Secure Quality of Service Handling: SQoSH
51. Secure Overlay Services
52. Secure and Flexible Global File Sharing
53. Secret Key Cryptography Using Graphics Cards
54. Scalable Resource Control in Active Networks
55. Safety and Security of Programmable Network Infrastructures
56. ROP Payload Detection Using Speculative Code Execution
57. Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation
58. Return Value Predictability Profiles for Self–healing
59. Return Value Predictability Profiles for Self-Healing
60. Retrofitting Security in COTS Software with Binary Rewriting
61. Requirements for Scalable Access Control and Security Management Architectures
62. Requirements for Scalable Access Control and Security Management Architectures
63. Remotely Keyed CryptoGraphics - Secure Remote Display Access Using (Mostly) Untrusted Hardware - Extended Version
64. Remotely Keyed Cryptographics: Secure Remote Display Access Using (Mostly) Untrusted Hardware
65. Recursive Sandboxes: Extending Systrace To Empower Applications
66. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points
67. Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions
68. Race to the Bottom: Malicious Hardware
69. Quantifying Application Behavior Space for Detection and Self-Healing
70. Pushback for Overlay Networks: Protecting Against Malicious Insiders
71. Privacy as an Operating System Service
72. Path-based Access Control for Enterprise Networks
73. Path-based Access Control for Enterprise Networks
74. "Patch-on-Demand" Saves Even More Time?
75. PalProtect: A Collaborative Security Approach to Comment Spam
76. PalProtect: A Collaborative Security Approach to Comment Spam
77. PachyRand: SQL Randomization for the PostgreSQL JDBC Driver
78. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec
79. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection
80. On the Infeasibility of Modeling Polymorphic Shellcode
81. On The General Applicability of Instruction-Set Randomization
82. On the Deployment of Dynamic Taint Analysis for Application Communities
83. Online Network Forensics for Automatic Repair Validation
84. On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses
85. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow
86. One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses
87. Offline Micropayments without Trusted Hardware
88. Next Generation Attacks on the Internet
89. MOVE: An End-to-End Solution To Network Denial of Service
90. Misuse Detection in Consent-based Networks
91. Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
92. Mediated Overlay Services (MOSES): Network Security as a Composable Service
93. Measuring the Deployment Hiccups of DNSSEC
94. Managing Access Control in Large Scale Heterogeneous Networks
95. Low Latency Anonymity with Mix Rings
96. LinkWidth: A Method to Measure Link Capacity and Available Bandwidth using Single-End Probes
97. LinkWidth: A Method to measure Link Capacity and Available Bandwidth Using Single-End Probes
98. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
99. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
100. KeyNote: Trust Management for Public-Key Infrastructures
- « Previous
- Next »
- 1
- 2
- 3