Fall 2001 |
Sep. 5 |
The Inevitability of Failure: The Flawed Assumption of Security in Modern
Computing Environment, Peter A. Loscocco, Stephen D. Smalley, Patric A.
Muckelbauer, Ruth C. Taylor, S. Jeff Turner, John F. Farrell, 21st National
Information Systems Security Conference (NISS), 1998
[Summary] |
Sep. 12 |
Inferring Internet Denial-of-Service Activity, David Moore, Geoffrey M.
Voelker Stefan Savage, 10th Usenix Security Symposium, 2001
[Summary] |
Sep. 19 |
Enforceable Security Policies, Fred Schneider, ACM Transactions on
Information and System Security, Vol. 3, Issue 1, 2000
|
Sep. 26 |
Generalized Role-Based Access Control for Securing Future Applications,
Michael J. Covington, Matthew J. Moyer, Mustaque Ahamad, 23rd National
Information Systems Security Conference, 2000
[Summary]
|
Oct. 3 |
Artificial Neural Networks for Misuse Detection, James Cannady, 21st
NISSC , 1998
[Summary] |
Oct. 10 |
Survival by Defense-Enabling, Partha Pal, Franklin Webber, Richard
Schantz, NSPW 2001
|
Oct. 17 |
Dos and Don'ts of Client Authentication on the Web, Kevin Fu, Emil Sit,
Kendra Smith, Nick Feamster, 10th Usenix Security Symposium, 2001
|
Oct. 24 |
What is a VPN?,
P. Ferguson, G. Huston |
Oct. 31 |
Digital Signatures, Certificates and
Electronic Commerce, Brian Gladman, Carl Ellison,
Nicholas Bohm |
Nov. 7 |
Hash-Based IP
Traceback, Alex C. Snoeren,
Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio,
Stephen T. Kent, W. Timothy Strayer, ACM SIGCOMM 2001 |
Nov. 14 |
Timing Attacks on
Web Privacy, Edward W. Felten,
Michael A. Schneider, ACM CCS 2000 |
Nov. 21 |
Colonial American Thanksgiving Cooking
|
Nov. 28 |
A Security Architecture for Computational Grids, Ian Foster, Carl
Kesselman, Gene Tsudik, Steven Tuecke, ACM 5th CCS, 1998
|
Dec. 5 |
Operating System Enhancements to Prevent the Misuse of System Calls,
Massimo Bernaschi, Emanuele Gabrielli, Luigi, V. Mancini, ACM 7th CCS, 2000
[Summary] |
Spring 2001 |
Feb. 9 2001 |
Publius Censorship Resistant Publishing System
[Summary] |
Feb. 16 |
The Eternity Service, Ross
Anderson
The Eternity Service, Tonda Benes
[Summary] |
Feb. 23 |
Auditable, Anonymous Electronic Cash,
Tomas Sander and Amnon
Ta-Shma, CRYPTO 1999
|
Mar. 2 |
Can Pseudonymity Really Guarantee Privacy? (alternate
link),
Josyula R. Rao and Pankaj Rohatgi,
Usenix Security Symposium
2000
[Summary] |
Mar. 9 |
ITS4: A Static Vulnerability Scanner for C and C++ Code, John Viega, J.T.
Bloch, Yoshi Kohno, Gary McGraw, ACSAC
2000
|
Mar. 16 |
Have a nice
spring break!
|
Mar. 23 |
Limiting the Disclosure of Access Control Policies During Automated Trust
Negotiation K. E. Seamons,
M. Winslett, T. Yu, Symposium on Network and Distributed System
Security 2001
|
Mar. 30 |
(In)Security of the WEP algorithm (paper
draft), Nikita Borisov, Ian Goldberg, David Wagner
|
Apr. 6 |
Funkspiel Schemes: An Alternative to Conventional Tamper Resistance,
Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung, 7th ACM Conference on
Computer and Communication Security
|
Apr. 13 |
Efficient Receipt-Free Voting Based on Homomorphic Encryption, Martin
Hirt, Kazue Sako, EUROCRYPT 2000
|
Apr. 20 |
Preventing Traffic Analysis for Real-Time Communication Networks, Y.
Guan, C. Li, D. Xuan, R. Bettati, Wei Zhao, Milcom '99
[Summary] |
Apr. 27 |
Digital-Ticket-Controlled Digital Ticket Circulation, Ko Fujimura,
Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, et al., 8th
Usenix Security Symposium, 1999
[Summary] |
Fall 2000 |
Oct, 2000
|
Rijndael
specification, Joan
Daemen and Vincent
Rijmen
|
Nov. 1
|
Crowds: anonymity for Web
transactions, Michael K. Reiter and
Aviel
D. Rubin, ACM Transactions
on Information and System Security, (June, 1998)
|
Nov. 8
|
A
wearable public key infrastructure (WPKI), H.
Muller and N. P. Smart,
Technical Report CSTR-00-006, Department
of Computer Science, University of
Bristol, (June, 2000)
|
Certificate
Revocation and Certificate Update, Moni
Naor and Kobbi
Nissim, Usenix Security
Symposium '98 |
Nov. 15
|
Practical Network Support for IP Traceback, Stefan
Savage, David
Wetherall, Anna Karlin and
Tom Anderson, ACM
SIGCOMM 2000
|
Nov. 22 |
The best way to cook the turkey, Santa
Claus
|
Nov. 29
|
Detecting
Backdoors, Yin Zhang
and Vern Paxson, Usenix
Security
Symposium 2000
|
Detecting
Stepping Stones, Yin Zhang
and Vern Paxson, Usenix
Security
Symposium 2000
|
Dec. 5 |
The
Design and Analysis of Graphical Passwords, Ian
Jermyn, Alain Mayer, Fabian
Monrose, Michael K.
Reiter and Avi Rubin, Usenix
Security
Symposium 1999
|
|