Conferences in DBLP
Amir Herzberg , Yosi Mass , Joris Mihaeli , Dalit Naor , Yiftach Ravid Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:2-14 [Conf ] Dirk Balfanz , Drew Dean , Mike Spreitzer A Security Infrastructure for Distributed Java Applications. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:15-26 [Conf ] Ninghui Li , Benjamin N. Grosof , Joan Feigenbaum A Practically Implementable and Tractable Delegation Logic. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:27-42 [Conf ] Dawn Xiaodong Song , David Wagner , Adrian Perrig Practical Techniques for Searches on Encrypted Data. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:44-55 [Conf ] Adrian Perrig , Ran Canetti , J. D. Tygar , Dawn Xiaodong Song Efficient Authentication and Signing of Multicast Streams over Lossy Channels. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:56-73 [Conf ] Cynthia E. Irvine , Timothy E. Levin Is Electronic Privacy Achievable? [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:76-77 [Conf ] Ross J. Anderson Privacy Technology Lessons from Healthcare. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:78-79 [Conf ] John A. Clark , Jeremy L. Jacob Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:82-95 [Conf ] Joshua D. Guttman , F. Javier Thayer Authentication Tests. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:96-109 [Conf ] Jonathan K. Millen , Harald Rueß Protocol-Independent Secrecy. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:110-209 [Conf ] Peter G. Neumann Robust Nonproprietary Software. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:122-123 [Conf ] Steven B. Lipner Security and Source Code Access: Issues and Realities. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:124-125 [Conf ] Fred B. Schneider Open Source in Security: Visiting the Bizarre. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:126-127 [Conf ] Gary McGraw Will Openish Source Really Improve Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:128-129 [Conf ] John R. Hughes , Tuomas Aura , Matt Bishop Using Conservation of Flow as a Security Mechanism in Network Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:132-131 [Conf ] Calvin Ko Logic Induction of Valid Behavior Specifications for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:142-153 [Conf ] Ronald W. Ritchey , Paul Ammann Using Model Checking to Analyze Network Vulnerabilities. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:156-165 [Conf ] Jonathan S. Shapiro , Sam Weber Verifying the EROS Confinement Mechanism. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:166-176 [Conf ] Alain J. Mayer , Avishai Wool , Elisha Ziskind Fang: A Firewall Analysis Engine. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:177-187 [Conf ] David A. Cooper A More Efficient Use of Delta-CRLs. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:190-202 [Conf ] Albert Levi , M. Ufuk Çaglayan An Efficient, Dynamic and Trust Preserving Public Key Infrastructure. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:203-214 [Conf ] Sanjeev Setia , Samir Koussih , Sushil Jajodia , Eric Harder Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:215-228 [Conf ] Timothy Fraser LOMAC: Low Water-Mark Integrity Protection for COTS Environments. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:230-245 [Conf ] Úlfar Erlingsson , Fred B. Schneider IRM Enforcement of Java Stack Inspection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:246-255 [Conf ]