Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education

Events 

NDSS Symposium 2003

Conference Proceedings

Defending Against Network Attacks

Fighting Spam by Encapsulating Policy in Email Addresses [PDF]
John Ioannidis

Moderately Hard, Memory-Bound Functions [PDF]
Martin Abadi, Michael Burrows, Ted Wobber

Secure IP Telephony using Multi-layered Protection [PDF]
Brennen Reynolds, Dipak Ghosal

Mobility and Secure Routing
Efficient Security Mechanisms for Routing Protocolsa [PDF]
Yih-Chun Hu, Adrian Perrig, David Johnson

Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing
[PDF]
Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick McDaniel, Aviel Rubin

Integrating Security, Mobility and Multi-Homing in a HIP Way
[PDF]
Pekka Nikander, Yukka Ylitalo, Jorma Wall
Access Control and Penetration Resistance
Access Control Based on Execution History [PDF]
Martin Abadi, Cedric Fournet

Testing C Programs for Buffer Overflow Vulnerabilities
[PDF]
Eric Haugh, Matthew Bishop

SiRiUS: Securing Remote Untrusted Storage [PDF]
Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh
Network Monitoring and Intrusion Detection
A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention   [PDF]
John Wilander, Mariam Kamkar

Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools [PDF]
Tal Garfinkel

Detecting Service Violations and DoS Attacks [PDF]
Ashan Habib, Mohamed Hefeeda, Bharat Bhargava

A Virtual Machine Introspection Based Architecture for Intrusion Detection [PDF]
Tal Garfinkel, Mendel Rosenblum
Cryptographic Protocols and Constructs
Proxy Cryptography Revisited [PDF]
Anca Ivan, Yevgeniy Dodis

Proactive Two-Party Signatures for User Authentication   [PDF]
Antonio Nicolosi, Maxwell Krohn, Yevgeniy Dodis, David Mazieres
Security in Multicast Protocols
Efficient Multicast Packet Authentication [PDF]
Alain Pannetrat, Refik Molva
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks [PDF]
Dongang Liu, Peng Ning

Copyright and Reprint Permissions: The Internet Society owns the copyrights for this publication and all of the papers contained herein.  You may freely reproduce all or part of any paper for noncommercial purposes if you credit the author(s), provide notice to the Internet Society, and cite the Internet Society as the copyright owner. Reproduction for commercial purposes is strictly prohibited without the prior written consent of the Internet Society, the first-named author (for reproduction of an entire paper only), and the author's employer if the paper was prepared within the scope of employment.

Address your correspondence to:  Manager of Conferences, Internet Society, 1775 Wiehle Avenue, Suite 102, Reston, Virginia 20190-5108, U.S.A., tel. +1 703 326 9880, fax +1 703 326 9881, orders@isoc.org.

The papers in this CD-Rom comprise the proceedings of the meeting mentioned above.  They reflect the authors' opinions and, in the interest of timely dissemination, are published as presented and without change.  Their inclusion in this publication does not necessarily constitute endorsement by the editors or the Internet Society.

ISBN Number 1-891562-16-9 (Paper)
ISBN Number 1-891562-15-0 (CD-Rom)