The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
2005 (conf/sp/2005)


  1. Program Committee. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:- [Conf]

  2. Conference Organizers. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:- [Conf]

  3. Message from the Program Chairs. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:- [Conf]
  4. Shai Rubin, Somesh Jha, Barton P. Miller
    Language-Based Generation and Evaluation of NIDS Signatures. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:3-17 [Conf]
  5. Rajeev Gopalakrishna, Eugene H. Spafford, Jan Vitek
    Efficient Intrusion Detection using Automaton Inlining. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:18-31 [Conf]
  6. Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant
    Semantics-Aware Malware Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:32-46 [Conf]
  7. Bryan Parno, Adrian Perrig, Virgil D. Gligor
    Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:49-63 [Conf]
  8. Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter
    Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:64-78 [Conf]
  9. Lujo Bauer, Scott Garriss, Michael K. Reiter
    Distributed Proving in Access-Control Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:81-95 [Conf]
  10. Ninghui Li, Mahesh V. Tripunitara
    On Safety in Discretionary Access Control. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:96-109 [Conf]
  11. Jonathan M. McCune, Adrian Perrig, Michael K. Reiter
    Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:110-124 [Conf]
  12. Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
    A Generic Attack on Checksumming-Based Software Tamper Resistance. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:127-138 [Conf]
  13. Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas
    Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:139-153 [Conf]
  14. Elaine Shi, Adrian Perrig, Leendert van Doorn
    BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:154-168 [Conf]
  15. Michael Backes, Birgit Pfitzmann
    Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:171-182 [Conf]
  16. Steven J. Murdoch, George Danezis
    Low-Cost Traffic Analysis of Tor. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:183-195 [Conf]
  17. Michael T. Goodrich
    Leap-Frog Packet Linking and Diverse Key Distributions for Improved Integrity in Network Broadcasts. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:196-207 [Conf]
  18. Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy
    Remote Physical Device Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:211-225 [Conf]
  19. James Newsome, Brad Karp, Dawn Xiaodong Song
    Polygraph: Automatically Generating Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:226-241 [Conf]
  20. Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang
    Worm Origin Identification Using Random Moonwalks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:242-256 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002