Conferences in DBLP
Xin Hu , Zhuoqing Morley Mao Accurate Real-time Identification of IP Prefix Hijacking. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:3-17 [Conf ] Wei Yu , Xinwen Fu , Steve Graham , Dong Xuan , Wei Zhao DSSS-Based Flow Marking Technique for Invisible Traceback. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:18-32 [Conf ] Charles C. Zhang , Marianne Winslett , Carl A. Gunter On the Safety and Efficiency of Firewall Policy Deployment. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:33-50 [Conf ] Stuart E. Schechter , Rachna Dhamija , Andy Ozment , Ian Fischer The Emperor's New Security Indicators. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:51-65 [Conf ] Philippe Golle , David Wagner Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:66-70 [Conf ] José Meseguer , Ralf Sasse , Helen J. Wang , Yi-Min Wang A Systematic Approach to Uncover Security Flaws in GUI Logic. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:71-85 [Conf ] Di Ma , Gene Tsudik Extended Abstract: Forward-Secure Sequential Aggregate Authentication. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:86-91 [Conf ] Alexandra Boldyreva , Virendra Kumar Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:92-100 [Conf ] Jan Camenisch , Anna Lysyanskaya , Mira Meyerovich Endorsed E-Cash. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:101-115 [Conf ] Xinyuan Wang , Shiping Chen , Sushil Jajodia Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:116-130 [Conf ] Ian Goldberg Improving the Robustness of Private Information Retrieval. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:131-148 [Conf ] Marco Pistoia , Anindya Banerjee , David A. Naumann Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:149-163 [Conf ] Ninghui Li , Ziqing Mao , Hong Chen Usable Mandatory Integrity Protection for Operating Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:164-178 [Conf ] Somesh Jha , Stefan Katzenbeisser , Christian Schallhart , Helmut Veith , Stephen Chenney Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:179-186 [Conf ] Michael Backes , Markus Dürmuth , Dominique Unruh Information Flow in the Peer-Reviewing Process. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:187-191 [Conf ] Jeffrey A. Vaughan , Steve Zdancewic A Cryptographic Decentralized Label Model. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:192-206 [Conf ] Aslan Askarov , Andrei Sabelfeld Gradual Release: Unifying Declassification, Encryption and Key Release Policies. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:207-221 [Conf ] Pau-Chen Cheng , Pankaj Rohatgi , Claudia Keser , Paul A. Karger , Grant M. Wagner , Angela Schuett Reninger Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:222-230 [Conf ] Andreas Moser , Christopher Krügel , Engin Kirda Exploring Multiple Execution Paths for Malware Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:231-245 [Conf ] Arati Baliga , Pandurang Kamat , Liviu Iftode Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:246-251 [Conf ] Weidong Cui , Marcus Peinado , Helen J. Wang , Michael E. Locasto ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:252-266 [Conf ] Jonathan M. McCune , Bryan Parno , Adrian Perrig , Michael K. Reiter , Arvind Seshadri Minimal TCB Code Execution. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:267-272 [Conf ] Stelios Sidiroglou , Oren Laadan , Angelos D. Keromytis , Jason Nieh Using Rescue Points to Navigate Software Recovery. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:273-280 [Conf ] Ted Huffmire , Brett Brotherton , Gang Wang , Timothy Sherwood , Ryan Kastner , Timothy E. Levin , Thuy D. Nguyen , Cynthia E. Irvine Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:281-295 [Conf ] Dakshi Agrawal , Selçuk Baktir , Deniz Karakoyunlu , Pankaj Rohatgi , Berk Sunar Trojan Detection using IC Fingerprinting. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:296-310 [Conf ] Kannan Srinathan , N. R. Prasad , C. Pandu Rangan On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:311-320 [Conf ] John Bethencourt , Amit Sahai , Brent Waters Ciphertext-Policy Attribute-Based Encryption. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:321-334 [Conf ] Jean Paul Degabriele , Kenneth G. Paterson Attacking the IPsec Standards in Encryption-only Configurations. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:335-349 [Conf ] Elaine Shi , John Bethencourt , Hubert T.-H. Chan , Dawn Xiaodong Song , Adrian Perrig Multi-Dimensional Range Query over Encrypted Data. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:350-364 [Conf ]