NDSS

SESSION 1: USER AUTHENTICATION AND PUBLIC KEY CRYPTOGRAPHY

Chair: Jonathan Trostle — Cisco Systems

Secure Password-Based Protocol for Downloading a Private Key

Radia Perlman and Charlie Kaufman

A Real-World Analysis of Kerberos Password Security

Thomas Wu

Secure Remote Access to an Internal Web Server

Christian Gilmore, David Kormann, and Aviel D. Rubin

SESSION 2: PANEL — SECURITY AND THE USER

Moderator: Win Treese — Open Market [Description]

Panelists: Peter Neumann — SRI
Mary Ellen Zurko — Iris Associates [Slides]
Mark Ackerman — University of California at Irvine [Slides]

SESSION 3: CRYPTOGRAPHIC PROTOCOLS

Chair: David Balenson — TIS Labs at Network Associates

Experimenting with Shared Generation of RSA Keys

Michael Malkin, Thomas Wu, and Dan Boneh

Addressing the Problem of Undetected Signature Key Compromise

Mike Just and Paul C. van Oorschot

Practical Approach to Anonymity in Large Scale Electronic Voting Schemes

Andreu Riera and Joan Borrell

SESSION 4: PANEL — SECURING THE INTERNET’S EXTERIOR ROUTING INFRASTRUCTURE

Moderator: Sue Hares — Merit [Slides]

Panelists: Sandra Murphy — TIS Labs at Network Associates [Slides]
Charles Lynn — BBN Technologies [Slides]
Tony Li — Juniper Networks, Inc. [Slides]
Curtis Villamizer — ANS Communications [Slides]

SESSION 5: POLICY AND TRUST MANAGEMENT

Chair: Warwick Ford — Verisign

Distributed Policy Management for JDK 1.2

Pekka Nikander and Jonna Partanen

Distributed Execution with Remote Audit

Fabian Monrose, Peter Wyckoff and Aviel D. Rubin

An Algebra for Assessing Trust in Certification Chains

Audun Josang

SESSION 6: PANEL — A NETWORK SECURITY RESEARCH AGENDA

Moderator: Fred Schneider — Cornell University [Slides]

Panelists: Steven M. Bellovin — AT&T Labs-Research [Slides]
Stephen T. Kent — BBN Technologies/GTE Internetworking [Slides]
Roger Needham — Microsoft
Hilarie K. Orman — DARPA [Slides]

SESSION 7: NETWORK INFRASTRUCTURE PROTECTION

Chair: Christoph L. Schuba — Sun Microsystems Laboratories

PGRIP: PNNI Global Routing Infrastructure Protection

Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli and Pierangela Samarati

Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks

Ari Juels and John Brainard

SESSION 8: PANEL — IPSEC: FRIEND OR FOE

Moderator: Dan Nessett — 3Com Corporation [Description]

Panelists: Rodney Thayer — EIS Corporation [Slides]
Bob Braden — USC/ISI [Slides]
Steven M. Bellovin — AT&T Labs Research [Slides]