You are here

Publications

Document Library

Proactive Two-Party Signatures for User Authentication

Date: 07 February 2003
Author(s):
Document Type: Reports
Tags: Associated event: NDSS Symposium 2003

Testing C Programs for Buffer Overflow Vulnerabilities

Date: 07 February 2003
Author(s): Eric Haugh, Matthew Bishop
Document Type: Reports
Tags: Associated event: NDSS Symposium 2003

A Virtual Machine Introspection Based Architecture for Intrusion Detection

Date: 07 February 2003
Author(s): Tal Garfinkel, Mendel Rosenblum
Document Type: Reports
Tags: Associated event: NDSS Symposium 2003

Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools

Date: 07 February 2003
Author(s): Tal Garfinkel
Document Type: Reports
Tags: Associated event: NDSS Symposium 2003

Efficient Multicast Packet Authentication

Date: 07 February 2003
Author(s): Alain Pannetrat, Refik Molva
Document Type: Reports
Tags: Associated event: NDSS Symposium 2003

SiRiUS: Securing Remote Untrusted Storage

Date: 07 February 2003
Author(s): Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh
Document Type: Reports
Tags: Associated event: NDSS Symposium 2003

Proxy Cryptography Revisited

Date: 07 February 2003
Author(s): Anca Ivan, Yevgeniy Dodis
Document Type: Reports
Tags: Associated event: NDSS Symposium 2003

Moderately Hard, Memory-Bound Functions

Date: 06 February 2003
Author(s): Martin Abadi, Michael Burrows, Ted Wobber
Document Type: Reports
Tags: Associated event: NDSS Symposium 2003

Access Control Based on Execution History

Date: 06 February 2003
Author(s): Martin Abadi, Cedric Fournet
Document Type: Reports
Tags: Associated event: NDSS Symposium 2003

Pages