The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
2000 (conf/sp/2000)

  1. Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid
    Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:2-14 [Conf]
  2. Dirk Balfanz, Drew Dean, Mike Spreitzer
    A Security Infrastructure for Distributed Java Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:15-26 [Conf]
  3. Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
    A Practically Implementable and Tractable Delegation Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:27-42 [Conf]
  4. Dawn Xiaodong Song, David Wagner, Adrian Perrig
    Practical Techniques for Searches on Encrypted Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:44-55 [Conf]
  5. Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:56-73 [Conf]
  6. Cynthia E. Irvine, Timothy E. Levin
    Is Electronic Privacy Achievable? [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:76-77 [Conf]
  7. Ross J. Anderson
    Privacy Technology Lessons from Healthcare. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:78-79 [Conf]
  8. John A. Clark, Jeremy L. Jacob
    Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:82-95 [Conf]
  9. Joshua D. Guttman, F. Javier Thayer
    Authentication Tests. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:96-109 [Conf]
  10. Jonathan K. Millen, Harald Rueß
    Protocol-Independent Secrecy. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:110-209 [Conf]
  11. Peter G. Neumann
    Robust Nonproprietary Software. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:122-123 [Conf]
  12. Steven B. Lipner
    Security and Source Code Access: Issues and Realities. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:124-125 [Conf]
  13. Fred B. Schneider
    Open Source in Security: Visiting the Bizarre. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:126-127 [Conf]
  14. Gary McGraw
    Will Openish Source Really Improve Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:128-129 [Conf]
  15. John R. Hughes, Tuomas Aura, Matt Bishop
    Using Conservation of Flow as a Security Mechanism in Network Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:132-131 [Conf]
  16. Calvin Ko
    Logic Induction of Valid Behavior Specifications for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:142-153 [Conf]
  17. Ronald W. Ritchey, Paul Ammann
    Using Model Checking to Analyze Network Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:156-165 [Conf]
  18. Jonathan S. Shapiro, Sam Weber
    Verifying the EROS Confinement Mechanism. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:166-176 [Conf]
  19. Alain J. Mayer, Avishai Wool, Elisha Ziskind
    Fang: A Firewall Analysis Engine. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:177-187 [Conf]
  20. David A. Cooper
    A More Efficient Use of Delta-CRLs. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:190-202 [Conf]
  21. Albert Levi, M. Ufuk Çaglayan
    An Efficient, Dynamic and Trust Preserving Public Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:203-214 [Conf]
  22. Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder
    Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:215-228 [Conf]
  23. Timothy Fraser
    LOMAC: Low Water-Mark Integrity Protection for COTS Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:230-245 [Conf]
  24. Úlfar Erlingsson, Fred B. Schneider
    IRM Enforcement of Java Stack Inspection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:246-255 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002