{"title":"Session details: Access control","authors":"Gail-Joon Ahn","doi":"10.1145/3247650","DOIUrl":"https://doi.org/10.1145/3247650","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134217190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Cryptographic protocols/ network security","authors":"Avi Rubin","doi":"10.1145/3247654","DOIUrl":"https://doi.org/10.1145/3247654","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Privacy/anonymity","authors":"S. Stubblebine","doi":"10.1145/3247651","DOIUrl":"https://doi.org/10.1145/3247651","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114829331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Emerging applications","authors":"P. Ning","doi":"10.1145/3247656","DOIUrl":"https://doi.org/10.1145/3247656","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Keynote","authors":"S. Jajodia","doi":"10.1145/3247647","DOIUrl":"https://doi.org/10.1145/3247647","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127619936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Intrusion detection","authors":"Peng Liu","doi":"10.1145/3247655","DOIUrl":"https://doi.org/10.1145/3247655","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Analysis and verification","authors":"Shiuhpyng W. Shieh","doi":"10.1145/3247657","DOIUrl":"https://doi.org/10.1145/3247657","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133751229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Information warfare","authors":"Joon Park","doi":"10.1145/3247653","DOIUrl":"https://doi.org/10.1145/3247653","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124071436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Authentication and signature schemes","authors":"P. Syverson","doi":"10.1145/3247652","DOIUrl":"https://doi.org/10.1145/3247652","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"180 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114058922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Sensor networks","authors":"Virgil Gilgor","doi":"10.1145/3247649","DOIUrl":"https://doi.org/10.1145/3247649","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}