Fighting Spam by Encapsulating Policy in Email Addresses
John Ioannidis
Moderately Hard, Memory-Bound Functions
Martin Abadi, Michael Burrows and Ted Wobber
Secure IP Telephony using Multi-layered Protection
Brennen Reynolds and Dipak Ghosal
Efficient Security Mechanisms for Routing Protocols
Yih-Chun Hu, A. Perrig and David Johnson
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing
Geoffrey Goodell, Bill Aiello, Timothy Griffin, John Ioannidis, P. McDaniel and A. Rubin
Integrating Security, Mobility and Multi-Homing in a HIP Way
Pekka Nikander, Yukka Yiltalo and Jorma Wall
Access Control Based on Execution History
Martin Abadi and Cedric Fournet
Testing C Programs for Buffer Overflow Vulnerabilities
Eric Haugh and Matthew Bishop
SiRiUS: Securing Remote Untrusted Storage
Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu and Dan Boneh
A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention
John Wilander and Martin Kamkar
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
Tal Garfinkel
Detecting Service Violations and DoS Attacks
Ashan Habib, Mohamed Hefeeda and Bharat Bhargava
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Tal Garfinkel and Mendel Rosenblum
Proxy Cryptography Revisited
Anca Ivan and Yevgeniy Dodis
Proactive Two-Party Signatures for User Authentication
Antonio Nicolosi, Maxwell Krohn, Yevgeniy Dodis and David Mazieres
Efficient Multicast Packet Authentication
Alain Pannetrat and Refik Molva
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks
Dongang Liu and Peng Ning