NDSS Symposium 2001 Program

Packet Flows

An Algebraic Approach to IP Traceback

D. Dean, M. Franklin and A. Stubblefield

Authenticating Streamed Data in the Presence of Random Packet Loss

P. Golle and N. Modadugu

Practical Experiences with ATM Encryption

G. Byrd, N. Hillery, and J. Symon

Security Protocols

Efficient and Secure Source Authentication for Multicast

A. Perrig, R. Canetti, D. Song and D. Tygar

TRICERT: A Distributed Certified E-Mail Scheme

G. Ateniese, B. de Medeiros and M.T. Goodrich

Trust Management

Trust Management for IPsec

M. Blaze, J. Ioannidis, and A.D. Keromytis

Building Certifications Paths: Forward vs. Reverse

Y. Elley, A. Anderson, S. Hanna, S. Mullan, R. Perlman, and S. Proctor

Decentralized Jini Security

P. Eronen, P. Nikander

Implementation Issues

Termination in Language-based Systems

A. Rudys, J. Clements, and D.S. Wallach

Cryptology As a Network Service

T. Berson, D. Dean, M. Franklin, D. Smetters, and M. Spreitzer

Implementation of Crossrealm Referral Handling in the MIT Kerberos Client

J. Trostle, and I. Kosinovsky