The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Security Symposium (uss)
2002 (conf/uss/2002)

  1. Russ Cox, Eric Grosse, Rob Pike, David L. Presotto, Sean Quinlan
    Security in Plan 9. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:3-16 [Conf]
  2. Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, Greg Kroah-Hartman
    Linux Security Modules: General Security Support for the Linux Kernel. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:17-31 [Conf]
  3. Xiaolan Zhang, Antony Edwards, Trent Jaeger
    Using CQUAL for Static Analysis of Authorization Hook Placement. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:33-48 [Conf]
  4. Yihua Liao, V. Rao Vemuri
    Using Text Categorization Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:51-59 [Conf]
  5. Jonathon T. Giffin, Somesh Jha, Barton P. Miller
    Detecting Manipulated Remote Call Streams. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:61-79 [Conf]
  6. Kyung-suk Lhee, Steve J. Chapin
    Type-Assisted Dynamic Buffer Overflow Detection. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:81-88 [Conf]
  7. Lujo Bauer, Michael A. Schneider, Edward W. Felten
    A General and Flexible Access-Control System for the Web. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:93-108 [Conf]
  8. Jonathan S. Shapiro, John Vanderburgh
    Access and Integrity Control in a Public-Access, High-Assurance Configuration Management System. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:109-120 [Conf]
  9. David Martin, Andrew Schulman
    Deanonymizing Users of the SafeWeb Anonymizing Service. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:123-137 [Conf]
  10. Scott G. Renfro
    VeriSign CZAG: Privacy Leak in X.509 Certificates. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:139-148 [Conf]
  11. Stuart Staniford, Vern Paxson, Nicholas Weaver
    How to Own the Internet in Your Spare Time. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:149-167 [Conf]
  12. Hao Chen, David Wagner, Drew Dean
    Setuid Demystified. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:171-190 [Conf]
  13. Vladimir Kiriansky, Derek Bruening, Saman P. Amarasinghe
    Secure Execution via Program Shepherding. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:191-206 [Conf]
  14. David S. Peterson, Matt Bishop, Raju Pandey
    A Flexible Containment Mechanism for Executing Untrusted Code. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:207-225 [Conf]
  15. Eric Rescorla, Adam Cain, Brian Korver
    SSLACC: A Clustered SSL Accelerator. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:229-246 [Conf]
  16. Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David R. Karger
    Infranet: Circumventing Web Censorship and Surveillance. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:247-262 [Conf]
  17. Zishuang (Eileen) Ye, Sean Smith
    Trusted Paths for Browsers. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:263-279 [Conf]
  18. Fabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih
    Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:283-296 [Conf]
  19. Petros Maniatis, Mary Baker
    Secure History Preservation Through Timeline Entanglement. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:297-312 [Conf]
  20. Peter Gutmann
    Lessons Learned in Implementing and Deploying Crypto Software. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:315-325 [Conf]
  21. John Black, Hector Urtubia
    Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:327-338 [Conf]
  22. Markus Jakobsson, Ari Juels, Ronald L. Rivest
    Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:339-353 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002