Conferences in DBLP
Ari Juels RFID: Security and Privacy for Five-Cent Computers. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] David Evans What Biology Can (and Can't) Teach Us About Security. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Gary McGraw Exploiting Software. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Cindy Cohn I Voted? How the Law Increasingly Restricts Independent Security Research. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Dan Geer Metrics, Economics, and Shared Risk at the National Scale. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Bill Cheswick My Dad's Computer, Microsoft, and the Future of Internet Security. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Stuart Staniford Military Strategy in CyberSpace. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] William Earl Boebert Keynote Address: Back to the Future. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Steven M. Bellovin Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Peter Szor Fighting Computer Virus Attacks. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Niels Provos A Virtual Honeypot Framework. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:1-14 [Conf ] Xuxian Jiang , Dongyan Xu Collapsar: A VM-Based Architecture for Network Attack Detention Center. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:15-28 [Conf ] Nicholas Weaver , Stuart Staniford , Vern Paxson Very Fast Containment of Scanning Worms. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:29-44 [Conf ] Kumar Avijit , Prateek Gupta , Deepak Gupta TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:45-56 [Conf ] David Brumley , Dawn Xiaodong Song Privtrans: Automatically Partitioning Programs for Privilege Separation. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:57-72 [Conf ] Yevgeniy Miretskiy , Abhijith Das , Charles P. Wright , Erez Zadok Avfs: An On-Access Anti-Virus File System. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:73-88 [Conf ] Umesh Shankar , Monica Chew , J. D. Tygar Side Effects Are Not Sufficient to Authenticate Software. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:89-102 [Conf ] Debin Gao , Michael K. Reiter , Dawn Xiaodong Song On Gray-Box Program Tracking for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:103-118 [Conf ] Robert Johnson , David Wagner Finding User/Kernel Pointer Bugs with Type Inference. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:119-134 [Conf ] Julie Thorpe , Paul C. van Oorschot Graphical Dictionaries and the Memorable Space of Graphical Passwords. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:135-150 [Conf ] Darren Davis , Fabian Monrose , Michael K. Reiter On User Choice in Graphical Password Schemes. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:151-164 [Conf ] Jonathan S. Shapiro , John Vanderburgh , Eric Northup , David Chizmadia Design of the EROS Trusted Window System. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:165-178 [Conf ] Nick L. Petroni Jr. , Timothy Fraser , Jesus Molina , William A. Arbaugh Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:179-194 [Conf ] Drew Dean , Alan J. Hu Fixing Races for Fun and Profit: How to Use access(2). [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:195-206 [Conf ] Dirk Balfanz , Glenn Durfee , Rebecca E. Grinter , Diana K. Smetters , Paul Stewart Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:207-222 [Conf ] Reiner Sailer , Xiaolan Zhang , Trent Jaeger , Leendert van Doorn Design and Implementation of a TCG-based Integrity Measurement Architecture. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:223-238 [Conf ] Patrick Lincoln , Phillip A. Porras , Vitaly Shmatikov Privacy-Preserving Sharing and Correlation of Security Alerts. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:239-254 [Conf ] Christopher Krügel , William K. Robertson , Fredrik Valeur , Giovanni Vigna Static Disassembly of Obfuscated Binaries. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:255-270 [Conf ] Hyang-Ah Kim , Brad Karp Autograph: Toward Automated, Distributed Worm Signature Detection. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:271-286 [Conf ] Dahlia Malkhi , Noam Nisan , Benny Pinkas , Yaron Sella Fairplay - Secure Two-Party Computation System. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:287-302 [Conf ] Roger Dingledine , Nick Mathewson , Paul F. Syverson Tor: The Second-Generation Onion Router. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:303-320 [Conf ] Jim Chow , Ben Pfaff , Tal Garfinkel , Kevin Christopher , Mendel Rosenblum Understanding Data Lifetime via Whole System Simulation (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:321-336 [Conf ]