


default search action
23rd S&P 2002: Berkeley, California, USA
- 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002. IEEE Computer Society 2002, ISBN 0-7695-1543-6

Session 1
- Markus G. Kuhn:

Optical Time-Domain Eavesdropping Risks of CRT Displays. 3-18 - Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu:

Statistical Identification of Encrypted Web Browsing Traffic. 19-30 - Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely:

Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. 31-41
Session 2
- John F. Canny:

Collaborative Filtering with Privacy. 45-57 - Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan:

P5: A Protocol for Scalable Anonymous Communication. 58-70
Session 3
- Patrick D. McDaniel, Atul Prakash

:
Methods and Limitations of Security Policy Reconciliation. 73-87 - Heiko Mantel:

On the Composition of Secure Systems. 88-101
Session 4
- John DeTreville:

Binder, a Logic-Based Security Language. 105-113 - Ninghui Li, John C. Mitchell, William H. Winsborough:

Design of a Role-Based Trust-Management Framework. 114-130 - Olav L. Bandmann, Babak Sadighi Firozabadi, Mads Dam:

Constrained Delegation. 131-140
Session 5
- Ken Ashcraft, Dawson R. Engler:

Using Programmer-Written Compiler Extensions to Catch Security Holes. 143-159 - Brian Chess:

Improving Computer Security Using Extended Static Checking. 160-173
Session 6
- Calvin Ko, Timothy Redmond:

Noninterference and Intrusion Detection. 177-187 - Kymie M. C. Tan, Roy A. Maxion:

"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. 188-201 - Frédéric Cuppens, Alexandre Miège:

Alert Correlation in a Cooperative Intrusion Detection Framework. 202-215 - Bruno Dutertre, Valentin Crettaz, Victoria Stavridou:

Intrusion-Tolerant Enclaves. 216-224
Session 7
- Jung-Min Park, Edwin K. P. Chong, Howard Jay Siegel:

Efficient Multicast Packet Authentication Using Signature Amortization. 227-240 - Jessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean:

Self-Healing Key Distribution with Revocation. 241-257 - Dawn Xiaodong Song, J. D. Tygar, David Zuckerman:

Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. 258-270
Session 8
- Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:

Automated Generation and Analysis of Attack Graphs. 273-284 - Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer:

Stateful Intrusion Detection for High-Speed Networks. 285-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














