NDSS Symposium 1999
SESSION 1: USER AUTHENTICATION AND PUBLIC KEY CRYPTOGRAPHY
Chair: Jonathan Trostle — Cisco Systems
Secure Password-Based Protocol for Downloading a Private Key
Radia Perlman and Charlie Kaufman
A Real-World Analysis of Kerberos Password Security
Thomas Wu
Secure Remote Access to an Internal Web Server
Christian Gilmore, David Kormann, and Aviel D. Rubin
SESSION 2: PANEL — SECURITY AND THE USER
Moderator: Win Treese — Open Market [Description]
Panelists: Peter Neumann — SRI
Mary Ellen Zurko — Iris Associates [Slides]
Mark Ackerman — University of California at Irvine [Slides]
SESSION 3: CRYPTOGRAPHIC PROTOCOLS
Chair: David Balenson — TIS Labs at Network Associates
Experimenting with Shared Generation of RSA Keys
Michael Malkin, Thomas Wu, and Dan Boneh
Addressing the Problem of Undetected Signature Key Compromise
Mike Just and Paul C. van Oorschot
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes
Andreu Riera and Joan Borrell
SESSION 4: PANEL — SECURING THE INTERNET’S EXTERIOR ROUTING INFRASTRUCTURE
Moderator: Sue Hares — Merit [Slides]
Panelists: Sandra Murphy — TIS Labs at Network Associates [Slides]
Charles Lynn — BBN Technologies [Slides]
Tony Li — Juniper Networks, Inc. [Slides]
Curtis Villamizer — ANS Communications [Slides]
SESSION 5: POLICY AND TRUST MANAGEMENT
Chair: Warwick Ford — Verisign
Distributed Policy Management for JDK 1.2
Pekka Nikander and Jonna Partanen
Distributed Execution with Remote Audit
Fabian Monrose, Peter Wyckoff and Aviel D. Rubin
An Algebra for Assessing Trust in Certification Chains
Audun Josang
SESSION 6: PANEL — A NETWORK SECURITY RESEARCH AGENDA
Moderator: Fred Schneider — Cornell University [Slides]
Panelists: Steven M. Bellovin — AT&T Labs-Research [Slides]
Stephen T. Kent — BBN Technologies/GTE Internetworking [Slides]
Roger Needham — Microsoft
Hilarie K. Orman — DARPA [Slides]
SESSION 7: NETWORK INFRASTRUCTURE PROTECTION
Chair: Christoph L. Schuba — Sun Microsystems Laboratories
PGRIP: PNNI Global Routing Infrastructure Protection
Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli and Pierangela Samarati
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks
Ari Juels and John Brainard
SESSION 8: PANEL — IPSEC: FRIEND OR FOE
Moderator: Dan Nessett — 3Com Corporation [Description]
Panelists: Rodney Thayer — EIS Corporation [Slides]
Bob Braden — USC/ISI [Slides]
Steven M. Bellovin — AT&T Labs Research [Slides]