An Algebraic Approach to IP Traceback
Drew Dean, M. Franklin and Adam Stubblefield
Authenticating Streamed Data in the Presence of Random Packet Loss
P. Golle and Nagendra Modadugu
Practical Experiences with ATM Encryption
G. Byrd, N. Hillery and J. Symon
Efficient and Secure Source Authentication for Multicast
A. Perrig, R. Canetti, Dawn Song and J. D. Tygar
TRICERT: A Distributed Certified E-Mail Scheme
Giuseppe Ateniese, B. De Medeiros and M. T. Goodrich
An Architecture for Flexible, High Assurance, Multi-Security Domain Networks
T. J. Gibson
Authentication and Key Agreement Via Memorable Passwords
T. Kwon
SPL: An Access Control Language for Security Policies and Complex Constraints
B. Ribeiro, A. Zuquete, P. Ferreira and P. Guedes
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation
Kent E. Seamons, M. Winslett and Tom Yu
Principles of Policy in Secure Groups
H. Harney, A. Colgrove and P. McDaniel
Trust Management for IPsec
Matt Blaze, John Ioannidis and A. Keromytis
Building Certifications Paths: Forward vs. Reverse
Y. Elley, A. Anderson, Steve Hanna, S. Mullan, Radia Perlman and S. Proctor
Decentralized Jini Security
P. Eronen and Pekka Nikander
Termination in Language-based Systems
A. Rudys, J. Clements and Dan S. Wallach
Cryptology As a Network Service
T. Berson, Drew Dean, M. Franklin, D. K. Smetters and M. Spreitzer
Implementation of Crossrealm Referral Handling in the MIT Kerberos Client
J. Trostle and I. Kosinovsky