Conferences in DBLP
Russ Cox , Eric Grosse , Rob Pike , David L. Presotto , Sean Quinlan Security in Plan 9. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:3-16 [Conf ] Chris Wright , Crispin Cowan , Stephen Smalley , James Morris , Greg Kroah-Hartman Linux Security Modules: General Security Support for the Linux Kernel. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:17-31 [Conf ] Xiaolan Zhang , Antony Edwards , Trent Jaeger Using CQUAL for Static Analysis of Authorization Hook Placement. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:33-48 [Conf ] Yihua Liao , V. Rao Vemuri Using Text Categorization Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:51-59 [Conf ] Jonathon T. Giffin , Somesh Jha , Barton P. Miller Detecting Manipulated Remote Call Streams. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:61-79 [Conf ] Kyung-suk Lhee , Steve J. Chapin Type-Assisted Dynamic Buffer Overflow Detection. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:81-88 [Conf ] Lujo Bauer , Michael A. Schneider , Edward W. Felten A General and Flexible Access-Control System for the Web. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:93-108 [Conf ] Jonathan S. Shapiro , John Vanderburgh Access and Integrity Control in a Public-Access, High-Assurance Configuration Management System. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:109-120 [Conf ] David Martin , Andrew Schulman Deanonymizing Users of the SafeWeb Anonymizing Service. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:123-137 [Conf ] Scott G. Renfro VeriSign CZAG: Privacy Leak in X.509 Certificates. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:139-148 [Conf ] Stuart Staniford , Vern Paxson , Nicholas Weaver How to Own the Internet in Your Spare Time. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:149-167 [Conf ] Hao Chen , David Wagner , Drew Dean Setuid Demystified. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:171-190 [Conf ] Vladimir Kiriansky , Derek Bruening , Saman P. Amarasinghe Secure Execution via Program Shepherding. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:191-206 [Conf ] David S. Peterson , Matt Bishop , Raju Pandey A Flexible Containment Mechanism for Executing Untrusted Code. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:207-225 [Conf ] Eric Rescorla , Adam Cain , Brian Korver SSLACC: A Clustered SSL Accelerator. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:229-246 [Conf ] Nick Feamster , Magdalena Balazinska , Greg Harfst , Hari Balakrishnan , David R. Karger Infranet: Circumventing Web Censorship and Surveillance. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:247-262 [Conf ] Zishuang (Eileen) Ye , Sean Smith Trusted Paths for Browsers. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:263-279 [Conf ] Fabian Monrose , Michael K. Reiter , Qi Li , Daniel P. Lopresti , Chilin Shih Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:283-296 [Conf ] Petros Maniatis , Mary Baker Secure History Preservation Through Timeline Entanglement. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:297-312 [Conf ] Peter Gutmann Lessons Learned in Implementing and Deploying Crypto Software. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:315-325 [Conf ] John Black , Hector Urtubia Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:327-338 [Conf ] Markus Jakobsson , Ari Juels , Ronald L. Rivest Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:339-353 [Conf ]