default search action
22nd S&P 2001: Oakland, California, USA
- 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA May 14-16, 2001. IEEE Computer Society 2001, ISBN 0-7695-1046-9
Tamper-Resistance and Cryptography
- Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth:
Cryptographic Security for Mobile Code. 2-11 - Philip D. MacKenzie, Michael K. Reiter:
Networked Cryptographic Devices Resilient to Capture. 12-25 - Wai W. Fung, Mordecai J. Golin, James W. Gray III:
Protection of Keys against Modification Attack. 26-36
Intrusion and Anomaly Detection I
- Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo:
Data Mining Methods for Detection of New Malicious Executables. 38-49 - John E. Gaffney Jr., Jacob W. Ulvila:
Evaluation of Intrusion Detectors: A Decision Theory Approach. 50-61
Information Flow
- Johan Agat, David Sands:
On Confidentiality and Algorithms. 64-77 - Heiko Mantel:
Preserving Information Flow Properties under Refinement. 78-91
Access Control and Trust Management
- Stephen Weeks:
Understanding Trust Management Systems. 94-105 - Trevor Jim:
SD3: A Trust Management System with Certified Evaluation. 106-115 - Xuhui Ao, Naftaly H. Minsky, Victoria Ungureanu:
Formal Treatment of Certificate Revocation under Communal Access Control. 116-127
Intrusion and Anomaly Detection II
- Wenke Lee, Dong Xiang:
Information-Theoretic Measures for Anomaly Detection. 130-143 - R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni:
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. 144-155 - David A. Wagner, Drew Dean:
Intrusion Detection via Static Analysis. 156-168
Cryptographic Protocols I
- Alan Harbitter, Daniel A. Menascé:
Performance of Public-Key-Enabled Kerberos Authentication in Large Networks. 170-183 - Birgit Pfitzmann, Michael Waidner:
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. 184-200
What's Really Different
- Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel:
Cryptographic Key Generation from Voice. 202-213 - Hilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen:
A Trend Analysis of Exploitations. 214-229
Cryptographic Protocols II
- Sara K. Miner, Jessica Staddon:
Graph-Based Authentication of Digital Streams. 232-246 - Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar:
ELK, A New Protocol for Efficient Large-Group Key Distribution. 247-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.