Next Last 1. 2002-05-26 [1] Reconciling Two Views of Cryptography (The Computational S secpapers aleph1 2. 2002-05-26 [1] Analyzing Security Protocols with Secrecy Types and Logic secpapers aleph1 3. 2002-05-26 [1] Private Authentication secpapers aleph1 4. 2002-05-26 [1] Certified Email with a Light On-line Trusted Third Party: secpapers aleph1 5. 2002-05-26 [2] A denial-of-service resistant intrusion detection architec secpapers aleph1 6. 2002-05-24 [2] Cyclone: A Safe Dialect of C secpapers Ben Laurie 7. 2002-05-24 [1] Fileteller: Paying and Getting Paid for File Storage secpapers aleph1 8. 2002-05-24 [1] A Secure Plan (Extended Version) secpapers aleph1 9. 2002-05-24 [1] xPF: Packet Filtering for Low-Cost Network Monitoring secpapers aleph1 10. 2002-05-24 [1] A Study of the Relative Costs of Network Security Protocol secpapers aleph1 11. 2002-05-24 [1] Designing an Embedded Firewall/VPN Gatweway secpapers aleph1 12. 2002-05-24 [1] Trust Management for IPsec secpapers aleph1 13. 2002-05-24 [1] Argus: A Distributed Network Intrusion Detection System secpapers aleph1 14. 2002-05-24 [1] Implementing the Security Module of a Smart card Operating secpapers aleph1 15. 2002-05-24 [1] Detection of Denial-of-QoS Attacks Based On Statistics And secpapers aleph1 16. 2002-05-24 [1] Body Check secpapers aleph1 17. 2002-05-23 [1] How to 0wn the Internet in Your Spare Time secpapers Vern Paxson 18. 2002-05-22 [1] Stack Inspection: Theory and Variants secpapers aleph1 19. 2002-05-22 [1] Types and effects for asymmetric cryptographic protocols secpapers aleph1 20. 2002-05-22 [1] Secrecy in Multiagent Systems secpapers aleph1 21. 2002-05-22 [1] Distributed Pattern Detection for Intrusion Detection secpapers aleph1 22. 2002-05-22 [1] Flexible, Mobile Agent based Intrusion Detection for Dynam secpapers aleph1 23. 2002-05-22 [1] Service Specific Anomaly Detection for Network Intrusion D secpapers aleph1 24. 2002-05-22 [1] Stateful Intrusion Detection for High-Speed Networks secpapers aleph1 25. 2002-05-22 [1] Automated Generation and Analysis of Attack Graphs secpapers aleph1 26. 2002-05-22 [1] Expander Graphs for Digital Stream Authentication and Robu secpapers aleph1 27. 2002-05-22 [1] Efficient Multicast Packet Authentication Using Signature secpapers aleph1 28. 2002-05-22 [1] Intrusion-Tolerant Enclaves secpapers aleph1 29. 2002-05-22 [1] "Why 6?" Defining the Operational Limits of stide secpapers aleph1 30. 2002-05-22 [1] Using Programmer-Written Compiler Extensions to Catch Secu secpapers aleph1 Next Last