


default search action
24th S&P 2003: Berkeley, California, USA
- 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA. IEEE Computer Society 2003, ISBN 0-7695-1940-7
Anonymity
- George Danezis, Roger Dingledine, Nick Mathewson:
Mixminion: Design of a Type III Anonymous Remailer Protocol. 2-15 - Dakshi Agrawal, Dogan Kesdogan, Stefan Penz:
Probabilistic Treatment of MIXes to Hamper Traffic Analysis. 16-27 - Matthew K. Wright
, Micah Adler, Brian Neil Levine, Clay Shields:
Defending Anonymous Communications Against Passive Logging Attack. 28-41
IDS
- Umesh Shankar, Vern Paxson:
Active Mapping: Resisting NIDS Evasion without Altering Traffic. 44-61 - Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong:
Anomaly Detection Using Call Stack Information. 62-
OS
- XiaoFeng Wang, Michael K. Reiter:
Defending Against Denial-of-Service Attacks with Puzzle Auction. 78-92 - Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song:
Pi: A Path Identification Mechanism to Defend against DDoS Attack. 93-
Formal Methods
- Ting Yu, Marianne Winslett:
A Unified Scheme for Resource Protection in Automated Trust Negotiation. 110-122 - Ninghui Li, William H. Winsborough, John C. Mitchell:
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. 123-139 - Michael Backes, Birgit Pfitzmann:
Intransitive Non-Interference for Cryptographic Purpose. 140-
Hardware
- Sudhakar Govindavajhala, Andrew W. Appel
:
Using Memory Errors to Attack a Virtual Machine. 154-165 - David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz:
Specifying and Verifying Hardware for Tamper-Resistant Software. 166-
Hardware & Crypto
- Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong:
Secret Handshakes from Pairing-Based Key Agreements. 180-196 - Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
Random Key Predistribution Schemes for Sensor Networks. 197-
Distributed Systems
- Doug Szajda, Barry G. Lawson, Jason Owen:
Hardening Functions for Large Scale Distributed Computations. 216-224 - Noam Kogan, Yuval Shavitt
, Avishai Wool
:
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. 225-235 - Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic:
Using Replication and Partitioning to Build Secure Distributed Systems. 236-250 - Jonathan S. Shapiro:
Vulnerabilities in Synchronous IPC Designs. 251-262 - David W. Price, Algis Rudys, Dan S. Wallach:
Garbage Collector Memory Accounting in Language-Based Systems. 263-274

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.