The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
2004 (conf/sp/2004)

  1. Dmitri Asonov, Rakesh Agrawal
    Keyboard Acoustic Emanations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:3-11 [Conf]
  2. Tuomas Aura, Pekka Nikander, Gonzalo Camarillo
    Effects of Mobility and Multihoming on Transport-Protocol Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:12-26 [Conf]
  3. Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
    Analysis of an Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:27-0 [Conf]
  4. Philip W. L. Fong
    Access Control By Tracking Shallow Execution History. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:43-55 [Conf]
  5. Jon A. Solworth, Robert H. Sloan
    A Layered Design of Discretionary Access Controls with Decidable Safety Properties. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:56-0 [Conf]
  6. Peeter Laud
    Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:71-85 [Conf]
  7. Bruno Blanchet
    Automatic Proof of Strong Secrecy for Security Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:86-0 [Conf]
  8. Michael P. Collins, Michael K. Reiter
    An Empirical Analysis of Target-Resident DoS Filters. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:103-114 [Conf]
  9. Jun Li, Minho Sung, Jun Xu, Li Li
    Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:115-129 [Conf]
  10. Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
    SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:130-0 [Conf]
  11. William H. Winsborough, Ninghui Li
    Safety in Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:147-160 [Conf]
  12. Lingyu Wang, Sushil Jajodia, Duminda Wijesekera
    Securing OLAP Data Cubes Against Privacy Breaches. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:161-0 [Conf]
  13. Stephen Tse, Steve Zdancewic
    Run-time Principals in Information-flow Type Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:179-193 [Conf]
  14. Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller
    Formalizing Sensitivity in Static Analysis for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:194-0 [Conf]
  15. Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan
    Fast Portscan Detection Using Sequential Hypothesis Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:211-225 [Conf]
  16. Maxwell N. Krohn, Michael J. Freedman, David Mazières
    On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:226-240 [Conf]
  17. Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos
    Multicast Authentication in Fully Adversarial Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:241-0 [Conf]
  18. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning
    An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:259-271 [Conf]
  19. Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla
    SWATT: SoftWare-based ATTestation for Embedded Devices. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:272-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002