Iván Arce

According to our database1, Iván Arce authored at least 19 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security Considerations for Transient Numeric Identifiers Employed in Network Protocols.
RFC, July, 2023

On the Generation of Transient Numeric Identifiers.
RFC, July, 2023

Unfortunate History of Transient Numeric Identifiers.
RFC, July, 2023

2014
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research.
login Usenix Mag., 2014

2010
Guest Editors' Introduction: In Cloud Computing We Trust - But Should We?
IEEE Secur. Priv., 2010

An attack on MySQL's login protocol
CoRR, 2010

2008
The Confused Deputy and the Domain Hijacker.
IEEE Secur. Priv., 2008

2007
Ghost in the Virtual Machine.
IEEE Secur. Priv., 2007

A Surprise Party (on Your Computer)?
IEEE Secur. Priv., 2007

2006
Voices, I hear voices [VoIP security].
IEEE Secur. Priv., 2006

2005
The Land of the Blind.
IEEE Secur. Priv., 2005

Bad Peripherals.
IEEE Secur. Priv., 2005

2004
Guest Editors' Introduction: Why Attacking Systems Is a Good Idea.
IEEE Secur. Priv., 2004

The Shellcode Generation.
IEEE Secur. Priv., 2004

The Kernel Craze.
IEEE Secur. Priv., 2004

More Bang For the Bug: An Account of 2003's Attack Trends.
IEEE Secur. Priv., 2004

2003
An Analysis of the Slapper Worm.
IEEE Secur. Priv., 2003

The Rise of the Gadgets.
IEEE Secur. Priv., 2003

The Weakest Link Revisited.
IEEE Secur. Priv., 2003


  Loading...