NDSS Symposium 2002 Accepted Papers
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
Adam Stubblefield, John Ioannidis and A. Rubin
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong
An Analysis of the Degradation of Anonymous Protocols
Matthew Wright, Micah Adler, Brian N. Levine and Clay Shields
Distributed Pattern Detection for Intrusion Detection
Christopher Kruegel and Thomas Toth
BlueBox: A Policy-Driven, Host-Based Intrusion Detection System
Suresh Chari and Pau-Chen Cheng
Implementing Pushback: Router-Based Defense Against DDoS Attacks
John Ioannidis and Steven Bellovin
Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses
Gabriel Montenegro and Claude Castelluccia
Detecting Steganographic Content on the Internet
Niels Provos and Peter Honeyman
Experimenting with Server-Aided Signatures
Xuhua Ding, Daniele Mazzocchi and Gene Tsudik
Managing Interoperability in Non-Hierarchical Public Key Infrastructures
Peter Hesse and David Lemire
Active Certificates: A Framework for Delegation
Nikita Borisov and Eric A. Brewer
PAMINA: A Certificate Based Privilege Management System
Zoltan Nochta, Peter Ebinger and Seastian Abeck
Performance Analysis of TLS Web Servers
Christian Coarfa, P. Druschel and Dan S. Wallach
Fast-Track Session Establishment for TLS
Hovav Shacham and Dan Boneh
Advanced Client/Server Authentication in TLS
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons and Bryan Smith