12. CCS 2005:
Alexandria, VA, USA Vijay Atluri, Catherine Meadows, Ari Juels (Eds.):
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005.
ACM 2005, ISBN 1-59593-226-7
Formal analysis of crypto protocols
Privacy and anonymity
Key management, key exchange, & pseudo-random generation
Intrusion detection and prevention
Security for diffuse computing
- Karl Krukow, Mogens Nielsen, Vladimiro Sassone:
A framework for concrete reputation-systems with applications to history-based access control.
- Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd:
An auctioning reputation system based on anomaly.
- Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg:
On the cost-ineffectiveness of redundancy in commercial P2P computing.
- Mudhakar Srivatsa, Ling Liu:
Securing publish-subscribe overlay services with EventGuard.
Attacking passwords and bringing down the network
Industry track invited talks
Last update Wed May 22 22:58:58 2013
CET by the DBLP Team — Data released under the ODC-BY 1.0 license — See also our legal information page
- Peter P. Swire:
Security market: incentives for disclosure of vulnerabilities.
- Guido Appenzeller:
Identity-based encryption from algorithm to enterprise deployment.
- Vance Bjorn:
Biometrics hit the mainstream: an analysis of security and privacy implications.