The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
2003 (conf/sp/2003)

  1. George Danezis, Roger Dingledine, Nick Mathewson
    Mixminion: Design of a Type III Anonymous Remailer Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:2-15 [Conf]
  2. Dakshi Agrawal, Dogan Kesdogan, Stefan Penz
    Probabilistic Treatment of MIXes to Hamper Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:16-27 [Conf]
  3. Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
    Defending Anonymous Communications Against Passive Logging Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:28-0 [Conf]
  4. Umesh Shankar, Vern Paxson
    Active Mapping: Resisting NIDS Evasion without Altering Traffic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:44-61 [Conf]
  5. Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong
    Anomaly Detection Using Call Stack Information. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:62-0 [Conf]
  6. XiaoFeng Wang, Michael K. Reiter
    Defending Against Denial-of-Service Attacks with Puzzle Auction. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:78-92 [Conf]
  7. Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
    Pi: A Path Identification Mechanism to Defend against DDoS Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:93-0 [Conf]
  8. Ting Yu, Marianne Winslett
    A Unified Scheme for Resource Protection in Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:110-122 [Conf]
  9. Ninghui Li, William H. Winsborough, John C. Mitchell
    Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:123-139 [Conf]
  10. Michael Backes, Birgit Pfitzmann
    Intransitive Non-Interference for Cryptographic Purpose. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:140-0 [Conf]
  11. Sudhakar Govindavajhala, Andrew W. Appel
    Using Memory Errors to Attack a Virtual Machine. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:154-165 [Conf]
  12. David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz
    Specifying and Verifying Hardware for Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:166-0 [Conf]
  13. Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong
    Secret Handshakes from Pairing-Based Key Agreements. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:180-196 [Conf]
  14. Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
    Random Key Predistribution Schemes for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:197-0 [Conf]
  15. Doug Szajda, Barry G. Lawson, Jason Owen
    Hardening Functions for Large Scale Distributed Computations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:216-224 [Conf]
  16. Noam Kogan, Yuval Shavitt, Avishai Wool
    A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:225-235 [Conf]
  17. Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic
    Using Replication and Partitioning to Build Secure Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:236-250 [Conf]
  18. Jonathan S. Shapiro
    Vulnerabilities in Synchronous IPC Designs. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:251-262 [Conf]
  19. David W. Price, Algis Rudys, Dan S. Wallach
    Garbage Collector Memory Accounting in Language-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:263-274 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002