|
Conferences in DBLP
- George Danezis, Roger Dingledine, Nick Mathewson
Mixminion: Design of a Type III Anonymous Remailer Protocol. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:2-15 [Conf]
- Dakshi Agrawal, Dogan Kesdogan, Stefan Penz
Probabilistic Treatment of MIXes to Hamper Traffic Analysis. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:16-27 [Conf]
- Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
Defending Anonymous Communications Against Passive Logging Attack. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:28-0 [Conf]
- Umesh Shankar, Vern Paxson
Active Mapping: Resisting NIDS Evasion without Altering Traffic. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:44-61 [Conf]
- Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong
Anomaly Detection Using Call Stack Information. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:62-0 [Conf]
- XiaoFeng Wang, Michael K. Reiter
Defending Against Denial-of-Service Attacks with Puzzle Auction. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:78-92 [Conf]
- Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
Pi: A Path Identification Mechanism to Defend against DDoS Attack. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:93-0 [Conf]
- Ting Yu, Marianne Winslett
A Unified Scheme for Resource Protection in Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:110-122 [Conf]
- Ninghui Li, William H. Winsborough, John C. Mitchell
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:123-139 [Conf]
- Michael Backes, Birgit Pfitzmann
Intransitive Non-Interference for Cryptographic Purpose. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:140-0 [Conf]
- Sudhakar Govindavajhala, Andrew W. Appel
Using Memory Errors to Attack a Virtual Machine. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:154-165 [Conf]
- David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz
Specifying and Verifying Hardware for Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:166-0 [Conf]
- Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong
Secret Handshakes from Pairing-Based Key Agreements. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:180-196 [Conf]
- Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
Random Key Predistribution Schemes for Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:197-0 [Conf]
- Doug Szajda, Barry G. Lawson, Jason Owen
Hardening Functions for Large Scale Distributed Computations. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:216-224 [Conf]
- Noam Kogan, Yuval Shavitt, Avishai Wool
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:225-235 [Conf]
- Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic
Using Replication and Partitioning to Build Secure Distributed Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:236-250 [Conf]
- Jonathan S. Shapiro
Vulnerabilities in Synchronous IPC Designs. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:251-262 [Conf]
- David W. Price, Algis Rudys, Dan S. Wallach
Garbage Collector Memory Accounting in Language-Based Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:263-274 [Conf]
|