The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
2001 (conf/sp/2001)

  1. Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth
    Cryptographic Security for Mobile Code. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:2-11 [Conf]
  2. Philip D. MacKenzie, Michael K. Reiter
    Networked Cryptographic Devices Resilient to Capture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:12-25 [Conf]
  3. Wai W. Fung, Mordecai J. Golin, James W. Gray III
    Protection of Keys against Modification Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:26-0 [Conf]
  4. Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo
    Data Mining Methods for Detection of New Malicious Executables. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:38-49 [Conf]
  5. John E. Gaffney Jr., Jacob W. Ulvila
    Evaluation of Intrusion Detectors: A Decision Theory Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:50-0 [Conf]
  6. Johan Agat, David Sands
    On Confidentiality and Algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:64-77 [Conf]
  7. Heiko Mantel
    Preserving Information Flow Properties under Refinement. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:78-0 [Conf]
  8. Stephen Weeks
    Understanding Trust Management Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:94-105 [Conf]
  9. Trevor Jim
    SD3: A Trust Management System with Certified Evaluation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:106-115 [Conf]
  10. Xuhui Ao, Naftaly H. Minsky, Victoria Ungureanu
    Formal Treatment of Certificate Revocation under Communal Access Control. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:116-0 [Conf]
  11. Wenke Lee, Dong Xiang
    Information-Theoretic Measures for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:130-143 [Conf]
  12. R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni
    A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:144-155 [Conf]
  13. David Wagner, Drew Dean
    Intrusion Detection via Static Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:156-0 [Conf]
  14. Alan Harbitter, Daniel A. Menascé
    Performance of Public-Key-Enabled Kerberos Authentication in Large Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:170-183 [Conf]
  15. Birgit Pfitzmann, Michael Waidner
    A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:184-0 [Conf]
  16. Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel
    Cryptographic Key Generation from Voice. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:202-213 [Conf]
  17. Hilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen
    A Trend Analysis of Exploitations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:214-0 [Conf]
  18. Sara K. Miner, Jessica Staddon
    Graph-Based Authentication of Digital Streams. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:232-246 [Conf]
  19. Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar
    ELK, A New Protocol for Efficient Large-Group Key Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:247-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002