12. CCS 2005:
USA Vijay Atluri, Catherine Meadows, Ari Juels (Eds.):
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005.
ACM 2005, ISBN 1-59593-226-7
Formal analysis of crypto protocols
Privacy and anonymity
& pseudo-random generation
Intrusion detection and prevention
Security for diffuse computing
- Karl Krukow, Mogens Nielsen, Vladimiro Sassone:
A framework for concrete reputation-systems with applications to history-based access control.
- Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd:
An auctioning reputation system based on anomaly.
- Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg:
On the cost-ineffectiveness of redundancy in commercial P2P computing.
- Mudhakar Srivatsa, Ling Liu:
Securing publish-subscribe overlay services with EventGuard.
Attacking passwords and bringing down the network
Industry track invited talks
Copyright © Mon Nov 2 20:23:39 2009
by Michael Ley (email@example.com)
- Peter P. Swire:
Security market: incentives for disclosure of vulnerabilities.
- Guido Appenzeller:
Identity-based encryption from algorithm to enterprise deployment.
- Vance Bjorn:
Biometrics hit the mainstream: an analysis of security and privacy implications.