|
|
Current Topics in Information Security (FS 2008): Papers
- Enforceable Security Policies
Fred B. Schneider
and
SASI Enforcement of Security Policies: A Retrospective
Ulfar Erlingson and Fred B. Schneider
- Verification and Change-Impact Analysis of Access-Control Policies
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyerovich, and Michael Carl Tschantz
- Specifying and Reasoning about Dynamic-Control Policies
Daniel J. Dougherty, Kathi Fisler, and Shriram Krishnamurthi
- SDSIrep: A Reputation System Based on SDSI
Ahmed Bouajjani, Javier Esparza, Stefan Schwoon, and Dejvuth Suwimonteerabuth
- Protocol Interactions and the Chosen Protocol Attack
John Kelsey, Bruce Schneier, and David Wagner
- Operational Semantics of Security Protocols
Cas Cremers and Sjouke Mauw
Network Security
- Mapping internet sensors with probe response attacks
John Bethencourt, Jason Franklin, and Mary Vernon
Contact: Martin Burkhart
Assigned to: Eugene Eilimon
- What's Going On? Learning Communication Rules In Edge Networks
Srikanth Kandula, Ranveer Chandra, and Dina Katabi
Contact: Bernhard Tellenbach
Assigned to: --
- Spamming Botnets: Signatures and Characteristics
Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov
Contact: Dominik Schatzmann
Assigned to:Sami Galal
- Understanding the Web Browser Threat
Stefan Frei, Thomas Dübendorfer, Gunter Ollmann, and Martin May
Contact: Frei Stefan
Assigned to: --
- Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
Charles Wright, Lucas Ballard, Scott Coull, Fabian Monrose, Gerald Masson
Contact: Mario Strasser
Assigned to: Lars Krapf
- Sensitivity of PCA for Traffic Anomaly Detection
Haakon Ringberg, Augustin Soule, and Christophe Diot
Contact: Daniela Brauckhoff
Assigned to: --
- Integrity Codes: Message Integrity Protection and Authentication Over Insecure Channels
Srdjan Capkun, Mario Cagalj, Ramkumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani Srivastava.
- Provable Data Possession at Untrusted Stores
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson , Dawn Song.
- Remote physical device fingerprinting
Tadayoshi Kohno, Andre Broido, K.C. Claffy.
- Mixminion: Design of a Type III Anonymous Remailer Protocol
George Danezis, Roger Dingledine, Nick Mathewson.
- Distance bounding in Noisy Environments
Dave Singelee and Bart Preneel.
- Secure Time Synchronization in Sensor Networks
Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava.
Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne
graphische Elemente dargestellt. Die Funktionalität der
Website ist aber trotzdem gewährleistet. Wenn Sie diese
Website regelmässig benutzen, empfehlen wir Ihnen, auf
Ihrem Computer einen aktuellen Browser zu installieren. Weitere
Informationen finden Sie auf
folgender
Seite.
Important Note:
The content in this site is accessible to any browser or
Internet device, however, some graphics will display correctly
only in the newer versions of Netscape. To get the most out of
our site we suggest you upgrade to a newer browser.
More
information