Conferences in DBLP
Markus G. Kuhn Optical Time-Domain Eavesdropping Risks of CRT Displays. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:3-18 [Conf ] Qixiang Sun , Daniel R. Simon , Yi-Min Wang , Wilf Russell , Venkata N. Padmanabhan , Lili Qiu Statistical Identification of Encrypted Web Browsing Traffic. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:19-30 [Conf ] Josyula R. Rao , Pankaj Rohatgi , Helmut Scherzer , Stephane Tinguely Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:31-0 [Conf ] John F. Canny Collaborative Filtering with Privacy. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:45-57 [Conf ] Rob Sherwood , Bobby Bhattacharjee , Aravind Srinivasan P5: A Protocol for Scalable Anonymous Communication. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:58-0 [Conf ] Patrick Drew McDaniel , Atul Prakash Methods and Limitations of Security Policy Reconciliation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:73-87 [Conf ] Heiko Mantel On the Composition of Secure Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:88-0 [Conf ] John DeTreville Binder, a Logic-Based Security Language. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:105-113 [Conf ] Ninghui Li , John C. Mitchell , William H. Winsborough Design of a Role-Based Trust-Management Framework. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:114-130 [Conf ] Olav L. Bandmann , Babak Sadighi Firozabadi , Mads Dam Constrained Delegation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:131-0 [Conf ] Ken Ashcraft , Dawson R. Engler Using Programmer-Written Compiler Extensions to Catch Security Holes. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:143-159 [Conf ] Brian Chess Improving Computer Security Using Extended Static Checking. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:160-0 [Conf ] Calvin Ko , Timothy Redmond Noninterference and Intrusion Detection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:177-187 [Conf ] Kymie M. C. Tan , Roy A. Maxion "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:188-201 [Conf ] Frédéric Cuppens , Alexandre Miège Alert Correlation in a Cooperative Intrusion Detection Framework. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:202-215 [Conf ] Bruno Dutertre , Valentin Crettaz , Victoria Stavridou Intrusion-Tolerant Enclaves. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:216-0 [Conf ] Jung Min Park , Edwin K. P. Chong , Howard Jay Siegel Efficient Multicast Packet Authentication Using Signature Amortization. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:227-240 [Conf ] Jessica Staddon , Sara K. Miner , Matthew K. Franklin , Dirk Balfanz , Michael Malkin , Drew Dean Self-Healing Key Distribution with Revocation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:241-257 [Conf ] Dawn Xiaodong Song , J. D. Tygar , David Zuckerman Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:258-0 [Conf ] Oleg Sheyner , Joshua W. Haines , Somesh Jha , Richard Lippmann , Jeannette M. Wing Automated Generation and Analysis of Attack Graphs. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:273-284 [Conf ] Christopher Krügel , Fredrik Valeur , Giovanni Vigna , Richard A. Kemmerer Stateful Intrusion Detection for High-Speed Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:285-0 [Conf ]