The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Security Symposium (uss)
2004 (conf/uss/2004)

  1. Ari Juels
    RFID: Security and Privacy for Five-Cent Computers. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  2. David Evans
    What Biology Can (and Can't) Teach Us About Security. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  3. Gary McGraw
    Exploiting Software. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  4. Cindy Cohn
    I Voted? How the Law Increasingly Restricts Independent Security Research. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  5. Dan Geer
    Metrics, Economics, and Shared Risk at the National Scale. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  6. Bill Cheswick
    My Dad's Computer, Microsoft, and the Future of Internet Security. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  7. Stuart Staniford
    Military Strategy in CyberSpace. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  8. William Earl Boebert
    Keynote Address: Back to the Future. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  9. Steven M. Bellovin
    Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  10. Peter Szor
    Fighting Computer Virus Attacks. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  11. Niels Provos
    A Virtual Honeypot Framework. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:1-14 [Conf]
  12. Xuxian Jiang, Dongyan Xu
    Collapsar: A VM-Based Architecture for Network Attack Detention Center. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:15-28 [Conf]
  13. Nicholas Weaver, Stuart Staniford, Vern Paxson
    Very Fast Containment of Scanning Worms. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:29-44 [Conf]
  14. Kumar Avijit, Prateek Gupta, Deepak Gupta
    TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:45-56 [Conf]
  15. David Brumley, Dawn Xiaodong Song
    Privtrans: Automatically Partitioning Programs for Privilege Separation. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:57-72 [Conf]
  16. Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok
    Avfs: An On-Access Anti-Virus File System. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:73-88 [Conf]
  17. Umesh Shankar, Monica Chew, J. D. Tygar
    Side Effects Are Not Sufficient to Authenticate Software. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:89-102 [Conf]
  18. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
    On Gray-Box Program Tracking for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:103-118 [Conf]
  19. Robert Johnson, David Wagner
    Finding User/Kernel Pointer Bugs with Type Inference. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:119-134 [Conf]
  20. Julie Thorpe, Paul C. van Oorschot
    Graphical Dictionaries and the Memorable Space of Graphical Passwords. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:135-150 [Conf]
  21. Darren Davis, Fabian Monrose, Michael K. Reiter
    On User Choice in Graphical Password Schemes. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:151-164 [Conf]
  22. Jonathan S. Shapiro, John Vanderburgh, Eric Northup, David Chizmadia
    Design of the EROS Trusted Window System. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:165-178 [Conf]
  23. Nick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh
    Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:179-194 [Conf]
  24. Drew Dean, Alan J. Hu
    Fixing Races for Fun and Profit: How to Use access(2). [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:195-206 [Conf]
  25. Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart
    Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:207-222 [Conf]
  26. Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn
    Design and Implementation of a TCG-based Integrity Measurement Architecture. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:223-238 [Conf]
  27. Patrick Lincoln, Phillip A. Porras, Vitaly Shmatikov
    Privacy-Preserving Sharing and Correlation of Security Alerts. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:239-254 [Conf]
  28. Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna
    Static Disassembly of Obfuscated Binaries. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:255-270 [Conf]
  29. Hyang-Ah Kim, Brad Karp
    Autograph: Toward Automated, Distributed Worm Signature Detection. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:271-286 [Conf]
  30. Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella
    Fairplay - Secure Two-Party Computation System. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:287-302 [Conf]
  31. Roger Dingledine, Nick Mathewson, Paul F. Syverson
    Tor: The Second-Generation Onion Router. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:303-320 [Conf]
  32. Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum
    Understanding Data Lifetime via Whole System Simulation (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:321-336 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002