Search: 
[] List [] Subjects [] Authors [] Bodies for list 'secpapers'
Set Page Width: [ 80 ] [ 90 ] [ 100 ] [ 120 ]
Viewing messages in list secpapers
- 2002-06-01 - 2002-07-01 (7 messages)
- 2002-05-01 - 2002-06-01 (42 messages)
- 2002-04-01 - 2002-05-01 (5 messages)
 Next  Last 

  1. 2002-05-26  [1] Reconciling Two Views of Cryptography (The Computational S secpapers   aleph1
  2. 2002-05-26  [1] Analyzing Security Protocols with Secrecy Types and Logic  secpapers   aleph1
  3. 2002-05-26  [1] Private Authentication                                     secpapers   aleph1
  4. 2002-05-26  [1] Certified Email with a Light On-line Trusted Third Party:  secpapers   aleph1
  5. 2002-05-26  [2] A denial-of-service resistant intrusion detection architec secpapers   aleph1
  6. 2002-05-24  [2] Cyclone: A Safe Dialect of C                               secpapers   Ben Laurie 
  7. 2002-05-24  [1] Fileteller: Paying and Getting Paid for File Storage       secpapers   aleph1
  8. 2002-05-24  [1] A Secure Plan (Extended Version)                           secpapers   aleph1
  9. 2002-05-24  [1] xPF: Packet Filtering for Low-Cost Network Monitoring      secpapers   aleph1
 10. 2002-05-24  [1] A Study of the Relative Costs of Network Security Protocol secpapers   aleph1
 11. 2002-05-24  [1] Designing an Embedded Firewall/VPN Gatweway                secpapers   aleph1
 12. 2002-05-24  [1] Trust Management for IPsec                                 secpapers   aleph1
 13. 2002-05-24  [1] Argus: A Distributed Network Intrusion Detection System    secpapers   aleph1
 14. 2002-05-24  [1] Implementing the Security Module of a Smart card Operating secpapers   aleph1
 15. 2002-05-24  [1] Detection of Denial-of-QoS Attacks Based On Statistics And secpapers   aleph1
 16. 2002-05-24  [1] Body Check                                                 secpapers   aleph1
 17. 2002-05-23  [1] How to 0wn the Internet in Your Spare Time                 secpapers   Vern Paxson 
 18. 2002-05-22  [1] Stack Inspection: Theory and Variants                      secpapers   aleph1
 19. 2002-05-22  [1] Types and effects for asymmetric cryptographic protocols   secpapers   aleph1
 20. 2002-05-22  [1] Secrecy in Multiagent Systems                              secpapers   aleph1
 21. 2002-05-22  [1] Distributed Pattern Detection for Intrusion Detection      secpapers   aleph1
 22. 2002-05-22  [1] Flexible, Mobile Agent based Intrusion Detection for Dynam secpapers   aleph1
 23. 2002-05-22  [1] Service Specific Anomaly Detection for Network Intrusion D secpapers   aleph1
 24. 2002-05-22  [1] Stateful Intrusion Detection for High-Speed Networks       secpapers   aleph1
 25. 2002-05-22  [1] Automated Generation and Analysis of Attack Graphs         secpapers   aleph1
 26. 2002-05-22  [1] Expander Graphs for Digital Stream Authentication and Robu secpapers   aleph1
 27. 2002-05-22  [1] Efficient Multicast Packet Authentication Using Signature  secpapers   aleph1
 28. 2002-05-22  [1] Intrusion-Tolerant Enclaves                                secpapers   aleph1
 29. 2002-05-22  [1] "Why 6?"   Defining the Operational Limits of stide        secpapers   aleph1
 30. 2002-05-22  [1] Using Programmer-Written Compiler Extensions to Catch Secu secpapers   aleph1

 Next  Last 

Configure | About | News | Add a list | Sponsored by KoreLogic