Volume 7,
Number 1,
Febuary 2004
Volume 7,
Number 2,
May 2004
- Trent Jaeger, Antony Edwards, Xiaolan Zhang:
Consistency analysis of authorization hook placement in the Linux security modules framework.
175-205
Electronic Edition (ACM DL) BibTeX
- Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre:
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm.
206-241
Electronic Edition (ACM DL) BibTeX
- William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Just fast keying: Key agreement in a hostile internet.
242-273
Electronic Edition (ACM DL) BibTeX
- Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu:
Techniques and tools for analyzing intrusion alerts.
274-318
Electronic Edition (ACM DL) BibTeX
- Adam Stubblefield, John Ioannidis, Aviel D. Rubin:
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).
319-332
Electronic Edition (ACM DL) BibTeX
Volume 7,
Number 3,
August 2004
Volume 7,
Number 4,
November 2004
Copyright © Sun May 17 00:26:02 2009
by Michael Ley (ley@uni-trier.de)