The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
2007 (conf/sp/2007)

  1. Xin Hu, Zhuoqing Morley Mao
    Accurate Real-time Identification of IP Prefix Hijacking. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:3-17 [Conf]
  2. Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao
    DSSS-Based Flow Marking Technique for Invisible Traceback. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:18-32 [Conf]
  3. Charles C. Zhang, Marianne Winslett, Carl A. Gunter
    On the Safety and Efficiency of Firewall Policy Deployment. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:33-50 [Conf]
  4. Stuart E. Schechter, Rachna Dhamija, Andy Ozment, Ian Fischer
    The Emperor's New Security Indicators. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:51-65 [Conf]
  5. Philippe Golle, David Wagner
    Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:66-70 [Conf]
  6. José Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang
    A Systematic Approach to Uncover Security Flaws in GUI Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:71-85 [Conf]
  7. Di Ma, Gene Tsudik
    Extended Abstract: Forward-Secure Sequential Aggregate Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:86-91 [Conf]
  8. Alexandra Boldyreva, Virendra Kumar
    Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:92-100 [Conf]
  9. Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich
    Endorsed E-Cash. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:101-115 [Conf]
  10. Xinyuan Wang, Shiping Chen, Sushil Jajodia
    Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:116-130 [Conf]
  11. Ian Goldberg
    Improving the Robustness of Private Information Retrieval. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:131-148 [Conf]
  12. Marco Pistoia, Anindya Banerjee, David A. Naumann
    Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:149-163 [Conf]
  13. Ninghui Li, Ziqing Mao, Hong Chen
    Usable Mandatory Integrity Protection for Operating Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:164-178 [Conf]
  14. Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
    Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:179-186 [Conf]
  15. Michael Backes, Markus Dürmuth, Dominique Unruh
    Information Flow in the Peer-Reviewing Process. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:187-191 [Conf]
  16. Jeffrey A. Vaughan, Steve Zdancewic
    A Cryptographic Decentralized Label Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:192-206 [Conf]
  17. Aslan Askarov, Andrei Sabelfeld
    Gradual Release: Unifying Declassification, Encryption and Key Release Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:207-221 [Conf]
  18. Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger
    Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:222-230 [Conf]
  19. Andreas Moser, Christopher Krügel, Engin Kirda
    Exploring Multiple Execution Paths for Malware Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:231-245 [Conf]
  20. Arati Baliga, Pandurang Kamat, Liviu Iftode
    Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:246-251 [Conf]
  21. Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto
    ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:252-266 [Conf]
  22. Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri
    Minimal TCB Code Execution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:267-272 [Conf]
  23. Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh
    Using Rescue Points to Navigate Software Recovery. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:273-280 [Conf]
  24. Ted Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine
    Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:281-295 [Conf]
  25. Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar
    Trojan Detection using IC Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:296-310 [Conf]
  26. Kannan Srinathan, N. R. Prasad, C. Pandu Rangan
    On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:311-320 [Conf]
  27. John Bethencourt, Amit Sahai, Brent Waters
    Ciphertext-Policy Attribute-Based Encryption. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:321-334 [Conf]
  28. Jean Paul Degabriele, Kenneth G. Paterson
    Attacking the IPsec Standards in Encryption-only Configurations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:335-349 [Conf]
  29. Elaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig
    Multi-Dimensional Range Query over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:350-364 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002