Conference Committee. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:- [Conf]
Message from the Program Chairs. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:- [Conf]
John D. McLean Is the Trusted Computing Base Concept Fundamentally Flawed? [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:2- [Conf]
Joshua D. Guttman Filtering Postures: Local Enforcement for Global Policies. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:120-129 [Conf]
John Hale, Sujeet Shenoi Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:188-199 [Conf]
Cynthia E. Irvine Security in Innovative New Operating Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:202-203 [Conf]
Adam Young, Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:224-235 [Conf]
Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:236-247 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP