NDSS Symposium 2003
Conference Proceedings
Defending Against Network Attacks
Fighting Spam by Encapsulating Policy in Email Addresses [PDF]
John Ioannidis
Moderately Hard, Memory-Bound Functions [PDF]
Martin Abadi, Michael Burrows, Ted Wobber
Secure IP Telephony using Multi-layered Protection [PDF]
Brennen Reynolds, Dipak Ghosal
Mobility and Secure Routing
Efficient Security Mechanisms for Routing Protocols [PDF]
Yih-Chun Hu, Adrian Perrig, David Johnson
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing [PDF]
Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick McDaniel, Aviel Rubin
Integrating Security, Mobility and Multi-Homing in a HIP Way [PDF]
Pekka Nikander, Yukka Ylitalo, Jorma Wall
Access Control and Penetration Resistance
Access Control Based on Execution History [PDF]
Martin Abadi, Cedric Fournet
Testing C Programs for Buffer Overflow Vulnerabilities [PDF]
Eric Haugh, Matthew Bishop
SiRiUS: Securing Remote Untrusted Storage [PDF]
Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh
Network Monitoring and Intrusion Detection
A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention [PDF]
John Wilander, Mariam Kamkar
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools [PDF]
Tal Garfinkel
Detecting Service Violations and DoS Attacks [PDF]
Ashan Habib, Mohamed Hefeeda, Bharat Bhargava
A Virtual Machine Introspection Based Architecture for Intrusion Detection[PDF]
Tal Garfinkel, Mendel Rosenblum
Cryptographic Protocols and Constructs
Proxy Cryptography Revisited [PDF]
Anca Ivan, Yevgeniy Dodis
Proactive Two-Party Signatures for User Authentication [PDF]
Antonio Nicolosi, Maxwell Krohn, Yevgeniy Dodis, David Mazieres
Security in Multicast Protocols
Efficient Multicast Packet Authentication [PDF]
Alain Pannetrat, Refik Molva