Conferences in DBLP
Dmitri Asonov , Rakesh Agrawal Keyboard Acoustic Emanations. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:3-11 [Conf ] Tuomas Aura , Pekka Nikander , Gonzalo Camarillo Effects of Mobility and Multihoming on Transport-Protocol Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:12-26 [Conf ] Tadayoshi Kohno , Adam Stubblefield , Aviel D. Rubin , Dan S. Wallach Analysis of an Electronic Voting System. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:27-0 [Conf ] Philip W. L. Fong Access Control By Tracking Shallow Execution History. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:43-55 [Conf ] Jon A. Solworth , Robert H. Sloan A Layered Design of Discretionary Access Controls with Decidable Safety Properties. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:56-0 [Conf ] Peeter Laud Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:71-85 [Conf ] Bruno Blanchet Automatic Proof of Strong Secrecy for Security Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:86-0 [Conf ] Michael P. Collins , Michael K. Reiter An Empirical Analysis of Target-Resident DoS Filters. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:103-114 [Conf ] Jun Li , Minho Sung , Jun Xu , Li Li Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:115-129 [Conf ] Abraham Yaar , Adrian Perrig , Dawn Xiaodong Song SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:130-0 [Conf ] William H. Winsborough , Ninghui Li Safety in Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:147-160 [Conf ] Lingyu Wang , Sushil Jajodia , Duminda Wijesekera Securing OLAP Data Cubes Against Privacy Breaches. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:161-0 [Conf ] Stephen Tse , Steve Zdancewic Run-time Principals in Information-flow Type Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:179-193 [Conf ] Henry Hanping Feng , Jonathon T. Giffin , Yong Huang , Somesh Jha , Wenke Lee , Barton P. Miller Formalizing Sensitivity in Static Analysis for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:194-0 [Conf ] Jaeyeon Jung , Vern Paxson , Arthur W. Berger , Hari Balakrishnan Fast Portscan Detection Using Sequential Hypothesis Testing. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:211-225 [Conf ] Maxwell N. Krohn , Michael J. Freedman , David Mazières On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:226-240 [Conf ] Anna Lysyanskaya , Roberto Tamassia , Nikos Triandopoulos Multicast Authentication in Fully Adversarial Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:241-0 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia , Peng Ning An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:259-271 [Conf ] Arvind Seshadri , Adrian Perrig , Leendert van Doorn , Pradeep K. Khosla SWATT: SoftWare-based ATTestation for Embedded Devices. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:272-0 [Conf ]