2003 |
11 | EE | Jason E. Holt,
Robert W. Bradshaw,
Kent E. Seamons,
Hilarie K. Orman:
Hidden Credentials.
WPES 2003: 1-8 |
10 | EE | Hilarie K. Orman:
The Morris Worm: A Fifteen-Year Perspective.
IEEE Security & Privacy 1(5): 35-43 (2003) |
2001 |
9 | EE | Hilarie K. Orman:
Data Integrity for Mildly Active Content.
Active Middleware Services 2001: 73-77 |
1999 |
8 | EE | Hilarie K. Orman:
Twenty Year Time Capsule Panel: The Future of Networking.
IEEE Symposium on Security and Privacy 1999: 239 |
7 | EE | Hilarie K. Orman:
Perspectives on Progress and Directions for Network Security Research.
NDSS 1999 |
6 | | Jonathan M. Smith,
Kenneth L. Calvert,
Sandra L. Murphy,
Hilarie K. Orman,
Larry L. Peterson:
Activating Networks: A Progress Report.
IEEE Computer 32(4): 32-41 (1999) |
1997 |
5 | | Nick Ogurtsov,
Hilarie K. Orman,
Richard Schroeppel,
Sean W. O'Malley,
Oliver Spatscheck:
Experimental Results of Covert Channel Limitation in One-Way Communication Systems.
NDSS 1997 |
4 | | James P. Anderson,
Sheila Brand,
Li Gong,
Thomas Haigh,
Steven B. Lipner,
Teresa F. Lunt,
Ruth Nelson,
William Neugent,
Hilarie K. Orman,
Marcus J. Ranum,
Roger R. Schell,
Eugene H. Spafford:
Firewalls: An Expert Roundtable.
IEEE Software 14(5): 60-66 (1997) |
1995 |
3 | EE | Richard Schroeppel,
Hilarie K. Orman,
Sean W. O'Malley,
Oliver Spatscheck:
Fast Key Exchange with Elliptic Curve Systems.
CRYPTO 1995: 43-56 |
1993 |
2 | | Hilarie K. Orman,
Sean W. O'Malley,
Edwin Menze III,
Larry L. Peterson,
Richard Schroeppel:
A Fast and General Implementation of Mach IPC in a Network.
USENIX MACH Symposium 1993: 75-88 |
1 | | Jeremy Epstein,
John McHugh,
Hilarie K. Orman,
R. Pascale,
Ann B. Marmor-Squires,
B. Danner,
C. Martin,
M. Branstad,
J. Benson,
D. Rothnie:
A High Assurance Window System Prototype.
Journal of Computer Security 2(2-3): 159-190 (1993) |