Conferences in DBLP
Program Committee. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:- [Conf ] Conference Organizers. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:- [Conf ] Message from the Program Chairs. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:- [Conf ] Shai Rubin , Somesh Jha , Barton P. Miller Language-Based Generation and Evaluation of NIDS Signatures. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:3-17 [Conf ] Rajeev Gopalakrishna , Eugene H. Spafford , Jan Vitek Efficient Intrusion Detection using Automaton Inlining. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:18-31 [Conf ] Mihai Christodorescu , Somesh Jha , Sanjit A. Seshia , Dawn Xiaodong Song , Randal E. Bryant Semantics-Aware Malware Detection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:32-46 [Conf ] Bryan Parno , Adrian Perrig , Virgil D. Gligor Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:49-63 [Conf ] Jonathan M. McCune , Elaine Shi , Adrian Perrig , Michael K. Reiter Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:64-78 [Conf ] Lujo Bauer , Scott Garriss , Michael K. Reiter Distributed Proving in Access-Control Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:81-95 [Conf ] Ninghui Li , Mahesh V. Tripunitara On Safety in Discretionary Access Control. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:96-109 [Conf ] Jonathan M. McCune , Adrian Perrig , Michael K. Reiter Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:110-124 [Conf ] Glenn Wurster , Paul C. van Oorschot , Anil Somayaji A Generic Attack on Checksumming-Based Software Tamper Resistance. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:127-138 [Conf ] Dwaine E. Clarke , G. Edward Suh , Blaise Gassend , Ajay Sudan , Marten van Dijk , Srinivas Devadas Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:139-153 [Conf ] Elaine Shi , Adrian Perrig , Leendert van Doorn BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:154-168 [Conf ] Michael Backes , Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:171-182 [Conf ] Steven J. Murdoch , George Danezis Low-Cost Traffic Analysis of Tor. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:183-195 [Conf ] Michael T. Goodrich Leap-Frog Packet Linking and Diverse Key Distributions for Improved Integrity in Network Broadcasts. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:196-207 [Conf ] Tadayoshi Kohno , Andre Broido , Kimberly C. Claffy Remote Physical Device Fingerprinting. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:211-225 [Conf ] James Newsome , Brad Karp , Dawn Xiaodong Song Polygraph: Automatically Generating Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:226-241 [Conf ] Yinglian Xie , Vyas Sekar , David A. Maltz , Michael K. Reiter , Hui Zhang Worm Origin Identification Using Random Moonwalks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:242-256 [Conf ]