ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
Latest Publications
TOTAL DOCUMENTS
42
(FIVE YEARS 0)
H-INDEX
24
(FIVE YEARS 0)
Published By ACM Press
1595932267
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Control-flow integrity
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
◽
10.1145/1102120.1102165
◽
2005
◽
Cited By ~ 418
Author(s):
Martín Abadi
◽
Mihai Budiu
◽
Úlfar Erlingsson
◽
Jay Ligatti
Keyword(s):
Control Flow
◽
Control Flow Integrity
Download Full-text
Automated trust negotiation using cryptographic credentials
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
◽
10.1145/1102120.1102129
◽
2005
◽
Cited By ~ 42
Author(s):
Jiangtao Li
◽
Ninghui Li
◽
William H. Winsborough
Keyword(s):
Trust Negotiation
◽
Automated Trust Negotiation
Download Full-text
Fast and automated generation of attack signatures
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
◽
10.1145/1102120.1102150
◽
2005
◽
Cited By ~ 54
Author(s):
Zhenkai Liang
◽
R. Sekar
Keyword(s):
Automated Generation
Download Full-text
Understanding and developing role-based administrative models
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
◽
10.1145/1102120.1102143
◽
2005
◽
Cited By ~ 28
Author(s):
Jason Crampton
Keyword(s):
Role Based
Download Full-text
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
◽
10.1145/1102120.1102152
◽
2005
◽
Cited By ~ 68
Author(s):
Jedidiah R. Crandall
◽
Zhendong Su
◽
S. Felix Wu
Download Full-text
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
◽
10.1145/1102120.1102147
◽
2005
◽
Cited By ~ 84
Author(s):
Mikhail J. Atallah
◽
Keith B. Frikken
◽
Marina Blanton
Keyword(s):
Key Management
Download Full-text
Tracking anonymous peer-to-peer VoIP calls on the internet
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
◽
10.1145/1102120.1102133
◽
2005
◽
Cited By ~ 90
Author(s):
Xinyuan Wang
◽
Shiping Chen
◽
Sushil Jajodia
Keyword(s):
Peer To Peer
◽
The Internet
Download Full-text
Identity-based encryption from algorithm to enterprise deployment
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
◽
10.1145/1102120.1102174
◽
2005
◽
Author(s):
Guido Appenzeller
Keyword(s):
Identity Based Encryption
◽
Identity Based
Download Full-text
Deciding security of protocols against off-line guessing attacks
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
◽
10.1145/1102120.1102125
◽
2005
◽
Cited By ~ 60
Author(s):
Mathieu Baudet
Download Full-text
Misbehaving TCP receivers can cause internet-wide congestion collapse
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
◽
10.1145/1102120.1102170
◽
2005
◽
Cited By ~ 22
Author(s):
Rob Sherwood
◽
Bobby Bhattacharjee
◽
Ryan Braud
Keyword(s):
Congestion Collapse
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close