Sixth USENIX Security Symposium, 1996
Sixth USENIX Security Symposium,
Focusing on Applications of Cryptography
July 22-25, 1996
San Jose, California
Wednesday, July 24
- Opening Remarks:
- Greg Rose, QUALCOMM
- Keynote Address: A Simple Distributed Security Infrastructure
- Ronald L. Rivest, MIT Laboratory for Computer Science
"He who controls the area controls the religion"-Latin
Chair: Brent Chapman, Great Circle Associates
- A Secure Environment for Untrusted
Helper Applications
- Ian Goldberg, David Wagner, Randi Thomas and Eric A. Brewer,
University of California, Berkeley
- A DNS Filter and Switch for
Packet-filtering Gateways
- Bill Cheswick, Lucent Technologies; Steven M. Bellovin, AT&T Research
- Confining Root Programs with Domain and Type
Enforcement
- Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J.
Petkac, David L. Sherman, Karen A. Oostendorp, Trusted Information
Systems, Inc.
"The secret whispers of each other's watch" -W.S.
Chair: Avi Rubin, Bellcore
- SSH - Secure Login Connections Over
the Internet
- Tatu Ylonen, SSH Comunications Security, Ltd., Finland
- Dual-workfactor Encrypted Key Exchange:
Efficiently Preventing Password Chaining and Dictionary
Attacks
- Barry Jaspan, Independent Consultant
- Security Mechanism Independence in ONC
RPC
- Mike Eisler, Roland J. Schemers and Raj Srinivasan, SunSoft, Inc.
"There are more things in heaven and earth"-W.S.
Chair: Steven M. Bellovin, AT&T Research
- Establishing Identity Without
Certification Authorities
- Carl Ellison, Cybercash, Inc.
- Secure Deletion of Data from Magnetic
and Solid-State Memory
- Peter Gutmann, University of Auckland
- A Revocable Backup System
- Dan Boneh and Richard J. Lipton, Princeton University
Thursday, July 25
"to promote commerce, and not betray it"-Pepys
Chair: Clifford Neuman, University of Southern California
- Building Blocks for Atomicity in
Electronic Commerce
- Jiawen Su and J.D. Tygar, Carnegie Mellon University
- Kerberos on Wall Street
- Isaac Hollander, P. Rajaram and Constantin Tanno, Morgan Stanley & Co.
- A Framework for Building an
Electronic Currency System
- Lei Tang, Carnegie Mellon University
"In middle of her Web, which spreadeth wide"-Davies
Chair: Kathy Fithen, CERT
- Chrg-http: A Tool for Micropayments on the World Wide Web
- Lei Tang, Carnegie Mellon University; Steve Low, AT&T Research
- Building Systems That Flexibly Download Executable Content
- Trent Jaeger and Atul Prakash, University of Michigan; Avi Rubin, Bellcore
- Enclaves: Enabling Secure Collaboration over the Internet
- Li Gong, SRI International
"Two massy keys he bore"-Milton
Chair: Diane Coe, The MITRE Corporation
- Public Key Distribution with Secure DNS
- James M. Galvin, EIT/VeriFone
- Compliance Defects in Public Key
Cryptography
- Don Davis, Independent Consultant
- Texas A&M University Anarchistic Key
Authorization (AKA)
- David Safford, Douglas Schales and David Hess, Texas A&M University
"... tangled in amorous nets"-Milton
Chair: Fred Avolio, Trusted Information Systems, Inc.
- Murphy's Law and Computer Security
- Wietse Venema, Eindhoven University of Technology
- NetKuang--A Multi-Host Configuration
Vulnerability Checker
- Dan Zerkle and Karl Levitt, University of California, Davis
- Problem Areas for the IP Security
Protocols
- Steven M. Bellovin, AT&T Research
|