Volume 7,
Number 1,
Febuary 2004
 
Volume 7,
Number 2,
May 2004
 
- Trent Jaeger, Antony Edwards, Xiaolan Zhang:
 Consistency analysis of authorization hook placement in the Linux security modules framework.
175-205
 Electronic Edition (ACM DL) BibTeX
- Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre:
 Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm.
206-241
 Electronic Edition (ACM DL) BibTeX
- William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
 Just fast keying: Key agreement in a hostile internet.
242-273
 Electronic Edition (ACM DL) BibTeX
- Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu:
 Techniques and tools for analyzing intrusion alerts.
274-318
 Electronic Edition (ACM DL) BibTeX
- Adam Stubblefield, John Ioannidis, Aviel D. Rubin:
 A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).
319-332
 Electronic Edition (ACM DL) BibTeX
Volume 7,
Number 3,
August 2004
 
Volume 7,
Number 4,
November 2004
 
Copyright © Sun May 17 00:26:02 2009
 by Michael Ley (ley@uni-trier.de)