The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
2006 (conf/sp/2006)


  1. External Reviewers. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:- [Conf]

  2. Program Committee. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:- [Conf]

  3. Message from the Program Chairs. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:- [Conf]
  4. David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha
    Towards Automatic Generation of Vulnerability-Based Signatures. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:2-16 [Conf]
  5. Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif
    MisleadingWorm Signature Generators Using Deliberate Noise Injection. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:17-31 [Conf]
  6. Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, Brian Chavez
    Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:32-47 [Conf]
  7. Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar
    Dataflow Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:48-62 [Conf]
  8. Alvaro A. Cárdenas, John S. Baras, Karl Seamon
    A Framework for the Evaluation of Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:63-77 [Conf]
  9. Kevin Borders, Xin Zhao, Atul Prakash
    Siren: Catching Evasive Malware (Short Paper). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:78-85 [Conf]
  10. Dogan Kesdogan, Dakshi Agrawal, Vinh Pham, Dieter Rautenbach
    Fundamental Limits on the Anonymity Provided by the MIX Technique. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:86-99 [Conf]
  11. Lasse Øverlier, Paul Syverson
    Locating Hidden Servers. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:100-114 [Conf]
  12. Yingjiu Li, Haibing Lu, Robert H. Deng
    Practical Inference Control for Data Cubes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:115-120 [Conf]
  13. Philippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow
    Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:121-131 [Conf]
  14. John Bethencourt, Dawn Xiaodong Song, Brent Waters
    New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:132-139 [Conf]
  15. Bruno Blanchet
    A Computationally Sound Mechanized Prover for Security Protocols. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:140-154 [Conf]
  16. Ricardo Corin, Sandro Etalle, Ari Saptawijaya
    A Logic for Constraint-based Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:155-168 [Conf]
  17. Dennis Hofheinz, Dominique Unruh
    Simulatable Security and Polynomially Bounded Concurrent Composability. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:169-183 [Conf]
  18. Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum
    Privacy and Contextual Integrity: Framework and Applications. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:184-198 [Conf]
  19. Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, Prasant Mohapatra
    FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:199-213 [Conf]
  20. Vinod Ganapathy, Trent Jaeger, Somesh Jha
    Retrofitting Legacy Code for Authorization Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:214-229 [Conf]
  21. Gilles Barthe, Tamara Rezk, David A. Naumann
    Deriving an Information Flow Checker and Certifying Compiler for Java. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:230-242 [Conf]
  22. Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson R. Engler
    Automatically Generating Malicious Disks using Symbolic Execution. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:243-257 [Conf]
  23. Nenad Jovanovic, Christopher Krügel, Engin Kirda
    Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:258-263 [Conf]
  24. Amit Vasudevan, Ramesh Yerraballi
    Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:264-279 [Conf]
  25. Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava
    Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:280-294 [Conf]
  26. Daphna Weinshall
    Cognitive Authentication Schemes Safe Against Spyware (Short Paper). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:295-300 [Conf]
  27. Ari Juels, Markus Jakobsson, Tom N. Jagatic
    Cache Cookies for Browser Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:301-305 [Conf]
  28. Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
    Secure Device Pairing based on a Visual Channel (Short Paper). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:306-313 [Conf]
  29. Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch
    SubVirt: Implementing malware with virtual machines. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:314-327 [Conf]
  30. Gerhard P. Hancke
    Practical Attacks on Proximity Identification Systems (Short Paper). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:328-333 [Conf]
  31. Pai Peng, Peng Ning, Douglas S. Reeves
    On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:334-349 [Conf]
  32. Richard S. Cox, Steven D. Gribble, Henry M. Levy, Jacob Gorm Hansen
    A Safety-Oriented Platform for Web Applications. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:350-364 [Conf]
  33. David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
    Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:365-370 [Conf]
  34. Zvi Gutterman, Benny Pinkas, Tzachy Reinman
    Analysis of the Linux Random Number Generator. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:371-385 [Conf]
  35. Andrea Bittau, Mark Handley, Joshua Lackey
    The Final Nail in WEP's Coffin. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:386-400 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002