Check out the new USENIX Web site. Check out the new USENIX Web site.

Home About USENIX Events Membership Publications Students
Sixth USENIX Security Symposium, 1996

Sixth USENIX Security Symposium,
Focusing on Applications of Cryptography

July 22-25, 1996
San Jose, California


Wednesday, July 24


Opening Remarks:
Greg Rose, QUALCOMM

Keynote Address: A Simple Distributed Security Infrastructure
Ronald L. Rivest, MIT Laboratory for Computer Science


"He who controls the area controls the religion"-Latin

Chair: Brent Chapman, Great Circle Associates
A Secure Environment for Untrusted Helper Applications
Ian Goldberg, David Wagner, Randi Thomas and Eric A. Brewer, University of California, Berkeley

A DNS Filter and Switch for Packet-filtering Gateways
Bill Cheswick, Lucent Technologies; Steven M. Bellovin, AT&T Research

Confining Root Programs with Domain and Type Enforcement
Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac, David L. Sherman, Karen A. Oostendorp, Trusted Information Systems, Inc.

"The secret whispers of each other's watch" -W.S.

Chair: Avi Rubin, Bellcore
SSH - Secure Login Connections Over the Internet
Tatu Ylonen, SSH Comunications Security, Ltd., Finland

Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks
Barry Jaspan, Independent Consultant

Security Mechanism Independence in ONC RPC
Mike Eisler, Roland J. Schemers and Raj Srinivasan, SunSoft, Inc.

"There are more things in heaven and earth"-W.S.

Chair: Steven M. Bellovin, AT&T Research
Establishing Identity Without Certification Authorities
Carl Ellison, Cybercash, Inc.

Secure Deletion of Data from Magnetic and Solid-State Memory
Peter Gutmann, University of Auckland

A Revocable Backup System
Dan Boneh and Richard J. Lipton, Princeton University

Thursday, July 25


"to promote commerce, and not betray it"-Pepys

Chair: Clifford Neuman, University of Southern California
Building Blocks for Atomicity in Electronic Commerce
Jiawen Su and J.D. Tygar, Carnegie Mellon University

Kerberos on Wall Street
Isaac Hollander, P. Rajaram and Constantin Tanno, Morgan Stanley & Co.

A Framework for Building an Electronic Currency System
Lei Tang, Carnegie Mellon University

"In middle of her Web, which spreadeth wide"-Davies

Chair: Kathy Fithen, CERT
Chrg-http: A Tool for Micropayments on the World Wide Web
Lei Tang, Carnegie Mellon University; Steve Low, AT&T Research

Building Systems That Flexibly Download Executable Content
Trent Jaeger and Atul Prakash, University of Michigan; Avi Rubin, Bellcore

Enclaves: Enabling Secure Collaboration over the Internet
Li Gong, SRI International

"Two massy keys he bore"-Milton

Chair: Diane Coe, The MITRE Corporation
Public Key Distribution with Secure DNS
James M. Galvin, EIT/VeriFone

Compliance Defects in Public Key Cryptography
Don Davis, Independent Consultant

Texas A&M University Anarchistic Key Authorization (AKA)
David Safford, Douglas Schales and David Hess, Texas A&M University

"... tangled in amorous nets"-Milton

Chair: Fred Avolio, Trusted Information Systems, Inc.
Murphy's Law and Computer Security
Wietse Venema, Eindhoven University of Technology

NetKuang--A Multi-Host Configuration Vulnerability Checker
Dan Zerkle and Karl Levitt, University of California, Davis

Problem Areas for the IP Security Protocols
Steven M. Bellovin, AT&T Research


?Need help? Use our Contacts page.

Last changed: 8 May 2002 aw
Conference Index
USENIX home