9th USENIX Security Symposium 2000 Aug. 14, 2000 to Aug. 17, 2000, Denver, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Os Security Dan S. Wallach None Security
Mapbox: Using Parameterized Behavior Classes To Confine Untrusted Applications Anurag Acharya , Mandar Raje None Security
A Secure Javetm Virtual Machine Leendert van Doorn None Security
Encrypting Virtual Memory Niels Provos Security
Dèj‡ Vu Ó A User Study: Using Images For Authentication Rachna Dhamija , Adrian Perrig None Security
Deomocracy Ian Goldberg None Security
Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System Aviel D. Rubin , Lorrie Faith Cranor , Marc Waldman None Security Web
Probabilistic Counting Of Large Digital Signature Collections Markus G. Kuhn None Security
Can Pseudonymity Really Guarantee Privacy? Josyula Rohatgi None Security
Hardware Markus G. Kuhn None Security
An Open-Source Cryptographic Coprocessor Peter Gutmann None Security
Secure Coprocessor Integration With Kerberos V5 Naomaru Itoi None Security
Analysis Of The Intel Pentium'S Ability To Support A Secure Virtual Machine Monitor John Scott Robin , Cynthia E. Irvine None Security Analysis
Intrusion Detection Wietse Venema None Security Intrusion Detection
Detecting And Countering System Intrusions Using Software Wrappers Lee Badger , Timothy Fraser , Calvin Ko , Douglas Kilpatrick None Security
Detecting Backdoors Vern Paxson , Yin Zhang None Security
Detecting Stepping Stones Yin Zhang , Vern Paxson Security
Automated Response Using System-Call Delays Anil Somayaji , Stephanie Forrest None Security
Network Protection Tara Whalen None Security
Centertrack: An Ip Overlay Network For Tracking Dos Floods Robert Stone None Security
A Multi-Layer Ipsec Protocol Yongguang Zhang , Bikramjit Singh None Security
Defeating Tcp/Ip Stack Fingerprinting Farnam Jahanian , Matthew Smart , G. Robert Malan None Security
E-Mail Elizabeth Zwicky None Security
A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Bruce Schneier , Jonathan Katz None Security
Pgp In Constrained Wireless Devices Michael Brown , Donny Cheung , Darrel Hankerson , Julio Lopez Hernandez , Michael Kirkup , Alfred Menezes None Security Wireless
Shibboleth: Private Mailing List Manager Matt Curtin None Security
Computer System Security: Is There Really A Threat? Dave Dittrich None Security
The Insecurity Industry Duncan Campbell None Security
Trust-Management Pitfalls Of Pki Mark Chen None Security
The Practical Use Of Cryptography In Human Rights Groups Suelette Dreyfus None Security Cryptography
Privacy-Degrading Technologies: How Not To Build The Future Ian Goldberg Security