12. CCS 2005:
Alexandria,
VA,
USA
Vijay Atluri, Catherine Meadows, Ari Juels (Eds.):
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005.
ACM 2005, ISBN 1-59593-226-7 BibTeX
Keynote address
Formal analysis of crypto protocols
Trust management
Privacy and anonymity
Authentication
Access control
Key management,
key exchange,
& pseudo-random generation
Intrusion detection and prevention
Security for diffuse computing
- Karl Krukow, Mogens Nielsen, Vladimiro Sassone:
A framework for concrete reputation-systems with applications to history-based access control.
260-269
Electronic Edition (ACM DL) BibTeX
- Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd:
An auctioning reputation system based on anomaly.
270-279
Electronic Edition (ACM DL) BibTeX
- Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg:
On the cost-ineffectiveness of redundancy in commercial P2P computing.
280-288
Electronic Edition (ACM DL) BibTeX
- Mudhakar Srivatsa, Ling Liu:
Securing publish-subscribe overlay services with EventGuard.
289-298
Electronic Edition (ACM DL) BibTeX
Cryptography
Automated analysis
Attacking passwords and bringing down the network
Industry track invited talks
Copyright © Sat May 16 23:00:57 2009
by Michael Ley (ley@uni-trier.de)