Anonymity in Wireless Broadcast Networks | 9 | 0.58 | 2009 |
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications | 6 | 0.50 | 2007 |
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings | 34 | 6.53 | 2005 |
Just fast keying: Key agreement in a hostile internet | 56 | 3.57 | 2004 |
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP) | 47 | 3.77 | 2004 |
A Pay-per-Use DoS Protection Mechanism for the Web | 7 | 0.55 | 2004 |
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing | 102 | 6.43 | 2003 |
WAR: wireless anonymous routing | 3 | 0.40 | 2003 |
WebDAVA: An Administrator-Free Approach To Web File-Sharing | 4 | 0.51 | 2003 |
TAPI: Transactions for Accessing Public Infrastructure | 10 | 0.71 | 2003 |
Secure And Flexible Global File Sharing | 15 | 0.78 | 2003 |
Experience with the keynote trust management system: applications and future directions | 30 | 1.69 | 2003 |
Design and Implementation of Virtual Private Services | 7 | 0.81 | 2003 |
Controlling high bandwidth aggregates in the network | 359 | 36.27 | 2002 |
Fileteller: paying and getting paid for file storage | 31 | 2.82 | 2002 |
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP | 115 | 27.58 | 2002 |
Implementing Pushback: Router-Based Defense Against DDoS Attacks | 252 | 18.15 | 2002 |
Aggregate congestion control | 2 | 0.39 | 2002 |
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols | 49 | 3.53 | 2001 |
Offline Micropayments without Trusted Hardware | 25 | 2.32 | 2001 |
Denial of Service - Panel Discussion | 0 | 0.34 | 2000 |
The role of trust management in distributed systems security | 234 | 19.03 | 1999 |
Trust Management and Network Layer Security Protocols | 20 | 3.56 | 1999 |
The Architecture and Implementation of Network Layer Security in UNIX. | 14 | 4.51 | 1993 |