The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
2002 (conf/sp/2002)

  1. Markus G. Kuhn
    Optical Time-Domain Eavesdropping Risks of CRT Displays. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:3-18 [Conf]
  2. Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu
    Statistical Identification of Encrypted Web Browsing Traffic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:19-30 [Conf]
  3. Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stephane Tinguely
    Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:31-0 [Conf]
  4. John F. Canny
    Collaborative Filtering with Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:45-57 [Conf]
  5. Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan
    P5: A Protocol for Scalable Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:58-0 [Conf]
  6. Patrick Drew McDaniel, Atul Prakash
    Methods and Limitations of Security Policy Reconciliation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:73-87 [Conf]
  7. Heiko Mantel
    On the Composition of Secure Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:88-0 [Conf]
  8. John DeTreville
    Binder, a Logic-Based Security Language. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:105-113 [Conf]
  9. Ninghui Li, John C. Mitchell, William H. Winsborough
    Design of a Role-Based Trust-Management Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:114-130 [Conf]
  10. Olav L. Bandmann, Babak Sadighi Firozabadi, Mads Dam
    Constrained Delegation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:131-0 [Conf]
  11. Ken Ashcraft, Dawson R. Engler
    Using Programmer-Written Compiler Extensions to Catch Security Holes. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:143-159 [Conf]
  12. Brian Chess
    Improving Computer Security Using Extended Static Checking. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:160-0 [Conf]
  13. Calvin Ko, Timothy Redmond
    Noninterference and Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:177-187 [Conf]
  14. Kymie M. C. Tan, Roy A. Maxion
    "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:188-201 [Conf]
  15. Frédéric Cuppens, Alexandre Miège
    Alert Correlation in a Cooperative Intrusion Detection Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:202-215 [Conf]
  16. Bruno Dutertre, Valentin Crettaz, Victoria Stavridou
    Intrusion-Tolerant Enclaves. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:216-0 [Conf]
  17. Jung Min Park, Edwin K. P. Chong, Howard Jay Siegel
    Efficient Multicast Packet Authentication Using Signature Amortization. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:227-240 [Conf]
  18. Jessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean
    Self-Healing Key Distribution with Revocation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:241-257 [Conf]
  19. Dawn Xiaodong Song, J. D. Tygar, David Zuckerman
    Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:258-0 [Conf]
  20. Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing
    Automated Generation and Analysis of Attack Graphs. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:273-284 [Conf]
  21. Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
    Stateful Intrusion Detection for High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:285-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002