NDSS Symposium 2002 Accepted Papers

Using the Fluhrer, Mantin, and Shamir Attack to Break WEP

Adam Stubblefield, John Ioannidis and A. Rubin

Talking to Strangers: Authentication in Ad-Hoc Wireless Networks

Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong

An Analysis of the Degradation of Anonymous Protocols

Matthew Wright, Micah Adler, Brian N. Levine and Clay Shields

Distributed Pattern Detection for Intrusion Detection

Christopher Kruegel and Thomas Toth

BlueBox: A Policy-Driven, Host-Based Intrusion Detection System

Suresh Chari and Pau-Chen Cheng

Implementing Pushback: Router-Based Defense Against DDoS Attacks

John Ioannidis and Steven Bellovin

Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses

Gabriel Montenegro and Claude Castelluccia

Detecting Steganographic Content on the Internet

Niels Provos and Peter Honeyman

Experimenting with Server-Aided Signatures

Xuhua Ding, Daniele Mazzocchi and Gene Tsudik

Managing Interoperability in Non-Hierarchical Public Key Infrastructures

Peter Hesse and David Lemire

Active Certificates: A Framework for Delegation

Nikita Borisov and Eric A. Brewer

PAMINA: A Certificate Based Privilege Management System

Zoltan Nochta, Peter Ebinger and Seastian Abeck

Performance Analysis of TLS Web Servers

Christian Coarfa, P. Druschel and Dan S. Wallach

Fast-Track Session Establishment for TLS

Hovav Shacham and Dan Boneh

Advanced Client/Server Authentication in TLS

Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons and Bryan Smith