
@string(COMMENTS = "
This is the CCSL bibtex file. Because we use a magical perl script to parse
it, the file has a few abnormalities: 

1. Each entry has three optional attributes: 
  'refereed' - Indicates whether or not the publication was refereed. 
    If this field is set to the string {false}, then we know that it was not
    refereed, and the entry will not be included in the top-level publication 
    listing. If the field is not specified, we treat it as refereed. 

  'in_lab' - Indicates whether or not the publication is a publication of the 
    CCSL. If not, then 'in_lab' should be set to {false}, and the entry will 
    not appear in the top-level publication listing. 

  'subjects' - A comma-separated list of subjects that describe the entry.
    Each subject _must_ be defined as a a macro (eg: @string(foo = {bar})).
    The value of the subject macro is a list of headings that the subject is 
    to appear under, separated by '/'s. A second macro, with '_file' should
    also be defined to indicate which file the subject should be added to. 
")


@string(awareness = "Intrusion Detection and Network Monitoring/Network Awareness, Classification and Visualization")
@string(awareness_file = "")

@string(crypto_ref = "Applied Cryptography/Cryptography Reference Book")
@string(crypto_ref_file = "")



@book{pvanoorschot--96,
  author    = {Alfred J. Menezes and Scott A. Vanstone and Paul C. Van Oorschot},
  title     = {Handbook of Applied Cryptography},
  year      = 1996,
  isbn      = {0-8493-8523-7},
  publisher = {CRC Press},
  url       = {{http://www.cacr.math.uwaterloo.ca/hac/}},
  refereed  = "false",
  in_lab    = "false",
  subjects  = {crypto_ref}
}

@techreport{ehughes-tr-06,
  author    = {E. Hughes},
  title     = {A Grammar for Describing Protocol Text},
  number    = "TR-06-02",
  institution = {School of Computer Science, Carleton University},
  year      = 2006,
  month     = {Feb},
  url		= {{http://www.scs.carleton.ca/research/tech_reports/2006/download/TR-06-02.pdf}},
  refereed  = "true",
  subjects  = {awareness, crypto_ref}
}

@inproceedings{ehughes-lisa-05,
  author    = {E. Hughes and A. Somayaji},
  title     = {Towards Network Awareness},
  booktitle = {Large Installation System Administration Conference (LISA'05)},
  year      = {2005},
  month			= {Dec},
  url				= {../paper-archive/ehughes-lisa-05.pdf}  
}

@inproceedings{yli-acsac-05,
  author    = {Y. Li and A. Somayaji},
  title     = {Securing Email Archives through User Modeling},
  booktitle = {Annual Computer Security Applications Conference (ACSAC'05)},
  year      = {2005},
  month			= {Dec},
  url				= {../paper-archive/yli-acsac-05.pdf}  
}

@inproceedings{amatrawy-acns-05,
  author    = {A. Matrawy, P. C. van Oorschot and A. Somayaji},
  title     = {Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management},
  booktitle = {Applied Cryptography and Network Security (ACNS'05)},
  year      = {2005},
  month			= {Jun},
  pages     = {104-121},
  url				= {../paper-archive/amatrawy-acns-05.pdf}  
}

@inproceedings{twan-ssn-06,
  AUTHOR = {T. Wan and P.C. van Oorschot},
  TITLE = {Analysis of BGP Prefix Origins During Google.s May 2005 Outage},
  YEAR = 2006,
  MONTH = "Apr", 
  booktitle = {Security in Systems and Networks (SSN'06)},  
  url = {../paper-archive/twan-ssn-06.pdf}
}

@inproceedings{twan-nato-05,
  AUTHOR = {T. Wan, P.C. van Oorschot and E. Kranakis},
  TITLE = {A Selective Introduction to Border Gateway Protocol (BGP) Security Issues},
  YEAR = 2005,
  MONTH = "Oct", 
  booktitle = {NATO Advanced Studies Institute on Network Security and Intrusion Detection},  
  url = {../paper-archive/twan-nato-05.pdf}
}

@inproceedings{twan-ndss-05,
  AUTHOR = {T. Wan, E. Kranakis and P.C. van Oorschot},
  TITLE = {Pretty Secure BGP},
  YEAR = 2005,
  MONTH = "Feb", 
  booktitle = {Network and Distributed System Security Symposium (NDSS'05)},  
  url = {../paper-archive/twan-ndss-05.pdf}
}

@inproceedings{twan-icics-04,
  AUTHOR = {T. Wan, E. Kranakis and P.C. van Oorschot},
  TITLE = {Securing the Destination Sequenced Distance Vector Routing Protocol (S-DSDV)},
  YEAR = 2004,
  MONTH = "Oct", 
  booktitle = {International Conference on Information and Communications Security (ICICS'04)},  
  url = {../paper-archive/twan-icics-04.pdf}
}

@inproceedings{twan-acns-04,
  AUTHOR = {T. Wan, E. Kranakis and P.C. van Oorschot},
  TITLE = {S-RIP: A Secure Distance Vector Routing Protocol},
  YEAR = 2004,
  MONTH = "Jun", 
  booktitle = {Applied Cryptography and Network Security (ACNS'04)},  
  url = {../paper-archive/twan-acns-04.pdf}
}

@article{pvanoorschot-tissec-06,
  AUTHOR = {P. C. van Oorschot and S. Stubblebine},
  TITLE = {On Countering Online Dictionary Attacks with Login Histories and Humans-in-the-Loop},
  YEAR = 2006,
  %MONTH = "(To appear)",
  journal = {ACM Transactions on Information and System Security (TISSEC) (to appear)},
  url = {../paper-archive/pvanoorschot-tissec-06.pdf}
}


@article{pvanoorschot-ijis-06,
  AUTHOR = {P. C. van Oorschot, J.M. Robert and M. Vargas Martin},
  TITLE = {A Monitoring System for Detecting Repeated Packets with 
	  Applications to Computer Worms},
  YEAR = 2006,
  %MONTH = "(To appear)",
  journal = {International Journal of Information Security (to appear)},
  url = {../paper-archive/pvanoorschot-ijis-06.pdf}
}

@inproceedings{pvanoorschot-nspw-05,
  AUTHOR = {P. C. van Oorschot},
  TITLE = {Message Authentication by Integrity with Public Corroboration},
  YEAR = 2005,
  MONTH = "Sep", 
  booktitle = {New Security Paradigms Workshop, (NSPW'05)},  
  url = {../paper-archive/pvanoorschot-nspw-05.pdf}
}

@inproceedings{pvanoorschot-fc-05,
  AUTHOR = {P. C. van Oorschot and S. Stubblebine},
  TITLE = {Countering Identity Theft through Digital Uniqueness, Location Cross-Checking, and Funneling},
  YEAR = 2005,
  MONTH = "Feb", 
  booktitle = {Financial Cryptography and Data Security (FC'05)},  
  url = {../paper-archive/pvanoorschot-fc-05.pdf}
}

@inproceedings{pvanoorschot-fc-04,
  AUTHOR = {S. Stubblebine and P. C. van Oorschot},
  TITLE = {Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop},
  YEAR = 2004,
  MONTH = "Feb", 
  booktitle = {Financial Cryptography and Data Security (FC'04)},  
  url = {../paper-archive/pvanoorschot-fc-04.pdf}
}

@inproceedings{dwhyte-acsac-05,
  AUTHOR = {D. Whyte, P.C. van Oorschot and E. Kranakis},
  TITLE = {Detecting Intra-Enterprise Scanning Worms Based on Address Resolution},
  YEAR = 2005,
  MONTH = "Dec", 
  booktitle = {Annual Computer Security Applications Conference (ACSAC'05)},  
  url = {../paper-archive/dwhyte-acsac-05.pdf}
}

@inproceedings{dwhyte-ndss-05,
  AUTHOR = {D. Whyte, E. Kranakis and P.C. van Oorschot},
  TITLE = {DNS-based Detection of Scanning Worms in an Enterprise Network},
  YEAR = 2005,
  MONTH = "Feb", 
  booktitle = {Network and Distributed System Security Symposium (NDSS'05)},  
  url = {../paper-archive/dwhyte-ndss-05.pdf}
}

@inproceedings{jthorpe-nspw-05,
  AUTHOR = {J. Thorpe, P. C. van Oorschot and A. Somayaji},
  TITLE = {Pass-thoughts: Authenticating With Our Minds},
  YEAR = 2005,
  MONTH = "Sep", 
  booktitle = {New Security Paradigms Workshop, (NSPW'05)},  
  url = {../paper-archive/jthorpe-nspw-05.pdf}
}

@inproceedings{jthorpe-usenix-04,
  AUTHOR = {J. Thorpe and P. C. van Oorschot},
  TITLE = {Graphical Dictionaries and the Memorable Space of Graphical Passwords},
  YEAR = 2004,
  MONTH = "Aug", 
  booktitle = {USENIX Security Symposium},  
  url = {../paper-archive/jthorpe-usenix-04.pdf}
}

@inproceedings{jthorpe-acsac-04,
  AUTHOR = {J. Thorpe and P. C. van Oorschot},
  TITLE = {Towards Secure Design Choices for Implementing Graphical Passwords},
  YEAR = 2004,
  MONTH = "Dec", 
  booktitle = {Annual Computer Security Applications Conference (ACSAC'04)},  
  url = {../paper-archive/jthorpe-acsac-04.pdf}
}


@article{pvanoorschot-ieeetdsc-05,
  AUTHOR = {P. van Oorschot, A. Somayaji and G. Wurster},
  TITLE = {Hardware-assisted circumvention of self-hashing software tamper resistance},
  YEAR = 2005,
  MONTH = "Jun", 
  journal = {IEEE Transactions on Dependable and Secure Computing},  
  url = {../paper-archive/pvanoorschot-ieeetdsc-05.pdf}
}

@inproceedings{gwurster-ieeesp-05,
  AUTHOR = {G. Wurster, P. van Oorschot and A. Somayaji},
  TITLE = {A generic attack on checksumming-based software tamper resistance},
  YEAR = 2005,
  MONTH = "May", 
  booktitle = {IEEE Symposium on Security and Privacy},  
  url = {../paper-archive/gwurster-ieeesp-05.pdf}
}

@inproceedings{mmannan-pst-04,
  AUTHOR = "M. Mannan and P. C. van Oorschot",
  TITLE = {Secure Public Instant Messaging: A Survey},
  YEAR = 2004,
  MONTH = "Oct", 
  address = "Fredericton, NB",
  booktitle = {Privacy, Security and Trust (PST'04)},
  pages = {69--77},
  url = {../paper-archive/mmannan-pst-04.pdf},
}

@inproceedings{mmannan-worm-05,
  AUTHOR = "M. Mannan and P. C. van Oorschot",
  TITLE = {On Instant Messaging Worms, Analysis and Countermeasures},
  YEAR = 2005,
  MONTH = "Nov", 
  address = "Fairfax, VA",
  booktitle = {ACM Workshop on Rapid Malcode (WORM'05)},  
  url = {../paper-archive/mmannan-worm-05.pdf}
}

@inproceedings{mmannan-fc-06,
  author    = {M. Mannan and P. C. van Oorschot},
  title     = {A Protocol for Secure Public Instant Messaging},
  booktitle = {Financial Cryptography and Data Security (FC'06)},
  publisher = {Springer-Verlag},
  series    = {LNCS},
  year      = {2006},
  month			= {Feb},
  url				= {../paper-archive/mmannan-fc-06.pdf}
}


