| 
Sixth USENIX Security Symposium, 1996
 
Sixth USENIX Security Symposium, 
Focusing on Applications of Cryptography
July 22-25, 1996 
San Jose, California
 
Wednesday, July 24
 
  - Opening Remarks:  
  
 - Greg Rose, QUALCOMM
  
    - Keynote Address: A Simple Distributed Security Infrastructure
  
 - Ronald L. Rivest, MIT Laboratory for Computer Science
  
  
 "He who controls the area controls the religion"-Latin
Chair: Brent Chapman, Great Circle Associates
    - A Secure Environment for Untrusted 
        Helper Applications
    
 - Ian Goldberg, David Wagner, Randi Thomas and Eric A. Brewer, 
        University of California, Berkeley
    
      - A DNS Filter and Switch for 
        Packet-filtering Gateways
    
 - Bill Cheswick, Lucent Technologies; Steven M. Bellovin, AT&T Research
    
      - Confining Root Programs with Domain and Type 
        Enforcement
    
 - Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. 
        Petkac, David L. Sherman, Karen A. Oostendorp, Trusted Information 
        Systems, Inc.
  
  
 
"The secret whispers of each other's watch" -W.S.
Chair: Avi Rubin, Bellcore
    - SSH - Secure Login Connections Over 
        the Internet
    
 - Tatu Ylonen, SSH Comunications Security, Ltd., Finland
    
      - Dual-workfactor Encrypted Key Exchange:
        Efficiently Preventing Password Chaining and Dictionary 
        Attacks
    
 - Barry Jaspan, Independent Consultant
    
      - Security Mechanism Independence in ONC 
        RPC
    
 - Mike Eisler, Roland J. Schemers and Raj Srinivasan, SunSoft, Inc.
  
  
 
"There are more things in heaven and earth"-W.S.
Chair: Steven M. Bellovin, AT&T Research
    - Establishing Identity Without 
        Certification Authorities
    
 - Carl Ellison, Cybercash, Inc.
    
      - Secure Deletion of Data from Magnetic 
        and Solid-State Memory
    
 - Peter Gutmann, University of Auckland
    
      - A Revocable Backup System
    
 - Dan Boneh and Richard J. Lipton, Princeton University
  
  
 
Thursday, July 25
 
"to promote commerce, and not betray it"-Pepys
Chair: Clifford Neuman, University of Southern California
    - Building Blocks for Atomicity in 
        Electronic Commerce
    
 - Jiawen Su and J.D. Tygar, Carnegie Mellon University
    
      - Kerberos on Wall Street
    
 - Isaac Hollander, P. Rajaram and Constantin Tanno, Morgan Stanley & Co.
    
      - A Framework for Building an 
        Electronic Currency System
    
 - Lei Tang, Carnegie Mellon University
  
  
 
"In middle of her Web, which spreadeth wide"-Davies
Chair: Kathy Fithen, CERT 
    - Chrg-http: A Tool for Micropayments on the World Wide Web
    
 - Lei Tang, Carnegie Mellon University; Steve Low, AT&T Research
    
      - Building Systems That Flexibly Download Executable Content
    
 - Trent Jaeger and Atul Prakash, University of Michigan; Avi Rubin, Bellcore
    
      - Enclaves: Enabling Secure Collaboration over the Internet
    
 - Li Gong, SRI International
  
  
 
"Two massy keys he bore"-Milton
Chair: Diane Coe, The MITRE Corporation 
    - Public Key Distribution with Secure DNS
    
 - James M. Galvin, EIT/VeriFone
    
      - Compliance Defects in Public Key 
        Cryptography
    
 - Don Davis, Independent Consultant
    
      - Texas A&M University Anarchistic Key 
        Authorization (AKA)
    
 - David Safford, Douglas Schales and David Hess, Texas A&M University
  
  
 
"... tangled in amorous nets"-Milton
Chair: Fred Avolio, Trusted Information Systems, Inc.
    - Murphy's Law and Computer Security
    
 - Wietse Venema, Eindhoven University of Technology
    
      - NetKuang--A Multi-Host Configuration 
        Vulnerability Checker
    
 - Dan Zerkle and Karl Levitt, University of California, Davis
    
      - Problem Areas for the IP Security 
        Protocols
    
 - Steven M. Bellovin, AT&T Research
  
  
 
  
 
   |