Abstract is missing.
- Trusting a trusted systemJohn D. McLean. 1 [doi]
- Operational experiences with high-volume network intrusion detectionHolger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer. 2-11 [doi]
- On the difficulty of scalably detecting network attacksKirill Levchenko, Ramamohan Paturi, George Varghese. 12-20 [doi]
- Testing network-based intrusion detection signatures using mutant exploitsGiovanni Vigna, William K. Robertson, Davide Balzarotti. 21-30 [doi]
- Payload attribution via hierarchical bloom filtersKulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon. 31-41 [doi]
- On mutually-exclusive roles and separation of dutyNinghui Li, Ziad Bizri, Mahesh V. Tripunitara. 42-51 [doi]
- KNOW Why your access was denied: regulating feedback for usable securityApu Kapadia, Geetanjali Sampemane, Roy H. Campbell. 52-61 [doi]
- Comparing the expressive power of access control modelsMahesh V. Tripunitara, Ninghui Li. 62-71 [doi]
- Attacking and repairing the winZip encryption schemeTadayoshi Kohno. 72-81 [doi]
- Reusable cryptographic fuzzy extractorsXavier Boyen. 82-91 [doi]
- Cryptanalysis of a provably secure CRT-RSA algorithmDavid Wagner. 92-97 [doi]
- Pong-cache poisoning in GUESSNeil Daswani, Hector Garcia-Molina. 98-109 [doi]
- Web tap: detecting covert web trafficKevin Borders, Atul Prakash. 110-120 [doi]
- On achieving software diversity for improved network security using distributed coloring algorithmsAdam J. O Donnell, Harish Sethu. 121-131 [doi]
- Direct anonymous attestationErnest F. Brickell, Jan Camenisch, Liqun Chen. 132-145 [doi]
- Concealing complex policies with hidden credentialsRobert W. Bradshaw, Jason E. Holt, Kent E. Seamons. 146-157 [doi]
- k-anonymous secret handshakes with reusable credentialsShouhuai Xu, Moti Yung. 158-167 [doi]
- Group signatures with verifier-local revocationDan Boneh, Hovav Shacham. 168-177 [doi]
- IP covert timing channels: design and detectionSerdar Cabuk, Carla E. Brodley, Clay Shields. 178-187 [doi]
- Private inference controlDavid P. Woodruff, Jessica Staddon. 188-197 [doi]
- Security policies for downgradingStephen Chong, Andrew C. Myers. 198-209 [doi]
- Privacy and security in library RFID: issues, practices, and architecturesDavid Molnar, David Wagner. 210-219 [doi]
- Parallel mixingPhilippe Golle, Ari Juels. 220-226 [doi]
- Fragile mixingMichael K. Reiter, Xiaofeng Wang. 227-235 [doi]
- A PIN-entry method resilient against shoulder surfingVolker Roth, Kai Richter, Rene Freidinger. 236-245 [doi]
- New client puzzle outsourcing techniques for DoS resistanceBrent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten. 246-256 [doi]
- Mitigating bandwidth-exhaustion attacks using congestion puzzlesXiaofeng Wang, Michael K. Reiter. 257-267 [doi]
- Verifying policy-based security for web servicesKarthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon. 268-277 [doi]
- A decision procedure for the verification of security protocols with explicit destructorsStéphanie Delaune, Florent Jacquemard. 278-287 [doi]
- Using build-integrated static checking to preserve correctness invariantsHao Chen, Jonathan S. Shapiro. 288-297 [doi]
- On the effectiveness of address-space randomizationHovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh. 298-307 [doi]
- Attestation-based policy enforcement for remote accessReiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn. 308-317 [doi]
- Gray-box extraction of execution graphs for anomaly detectionDebin Gao, Michael K. Reiter, Dawn Xiaodong Song. 318-329 [doi]
- The dual receiver cryptosystem and its applicationsTheodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung. 330-343 [doi]
- Versatile padding schemes for joint signature and encryptionYevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish. 344-353 [doi]
- ID-based encryption for complex hierarchies with applications to forward security and broadcast encryptionDanfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya. 354-363 [doi]