Abstract is missing.
- System and network trustworthiness in perspectivePeter G. Neumann. 1-5 [doi]
- Providing witness anonymity in peer-to-peer systemsBo Zhu, Sanjeev Setia, Sushil Jajodia. 6-16 [doi]
- Salsa: a structured approach to large-scale anonymityArjun Nambiar, Matthew Wright. 17-26 [doi]
- Hot or not: revealing hidden services by their clock skewSteven J. Murdoch. 27-36 [doi]
- Packet vaccine: black-box exploit detection and signature generationXiaofeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi. 37-46 [doi]
- Protomatching network traffic for high throughputnetwork intrusion detectionShai Rubin, Somesh Jha, Barton P. Miller. 47-58 [doi]
- Evading network anomaly detection systems: formal reasoning and practical techniquesPrahlad Fogla, Wenke Lee. 59-68 [doi]
- Data collection with self-enforcing privacyPhilippe Golle, Frank McSherry, Ilya Mironov. 69-78 [doi]
- Searchable symmetric encryption: improved definitions and efficient constructionsReza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky. 79-88 [doi]
- Attribute-based encryption for fine-grained access control of encrypted dataVipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters. 89-98 [doi]
- Secure attribute-based systemsMatthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters. 99-112 [doi]
- Resiliency policies in access controlNinghui Li, Mahesh V. Tripunitara, Qihua Wang. 113-123 [doi]
- Safety and consistency in policy-based authorization systemsAdam J. Lee, Marianne Winslett. 124-133 [doi]
- On the modeling and analysis of obligationsKeith Irwin, Ting Yu, William H. Winsborough. 134-143 [doi]
- RoleMiner: mining roles using subset enumerationJaideep Vaidya, Vijayalakshmi Atluri, Janice Warner. 144-153 [doi]
- Doppelganger: Better browser privacy without the botherUmesh Shankar, Chris Karlof. 154-167 [doi]
- Fourth-factor authentication: somebody you knowJohn G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung. 168-178 [doi]
- An effective defense against email spam launderingMengjun Xie, Heng Yin, Haining Wang. 179-190 [doi]
- Forward-secure signatures with untrusted updateXavier Boyen, Hovav Shacham, Emily Shen, Brent Waters. 191-200 [doi]
- How to win the clonewars: efficient periodic n-times anonymous authenticationJan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich. 201-210 [doi]
- A fully collusion resistant broadcast, trace, and revoke systemDan Boneh, Brent Waters. 211-220 [doi]
- Puppetnets: misusing web browsers as a distributed attack infrastructureV. T. Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis. 221-234 [doi]
- A natural language approach to automated cryptanalysis of two-time padsJoshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield. 235-244 [doi]
- Dictionary attacks using keyboard acoustic emanationsYigael Berger, Avishai Wool, Arie Yeredor. 245-254 [doi]
- Inferring the source of encrypted HTTP connectionsMarc Liberatore, Brian Neil Levine. 255-263 [doi]
- TinySeRSync: secure and resilient time synchronization in wireless sensor networksKun Sun, Peng Ning, Cliff Wang. 264-277 [doi]
- Secure hierarchical in-network aggregation in sensor networksHaowen Chan, Adrian Perrig, Dawn Xiaodong Song. 278-287 [doi]
- Provably-secure time-bound hierarchical key assignment schemesGiuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci. 288-297 [doi]
- Optimizing BGP security by exploiting path stabilityKevin R. B. Butler, Patrick McDaniel, William Aiello. 298-310 [doi]
- Replayer: automatic protocol replay by binary analysisJames Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song. 311-321 [doi]
- EXE: automatically generating inputs of deathCristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler. 322-335 [doi]
- A scalable approach to attack graph generationXinming Ou, Wayne F. Boyer, Miles A. McQueen. 336-345 [doi]
- Formal specification and verification of data separation in a separation kernel for an embedded systemConstance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John D. McLean. 346-355 [doi]
- Beyond separation of duty: an algebra for specifying high-level security policiesNinghui Li, Qihua Wang. 356-369 [doi]
- Computationally sound secrecy proofs by mechanized flow analysisMichael Backes, Peeter Laud. 370-379 [doi]
- Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiationMihir Bellare, Tadayoshi Kohno, Victor Shoup. 380-389 [doi]
- Multi-signatures in the plain public-Key model and a general forking lemmaMihir Bellare, Gregory Neven. 390-399 [doi]
- Deniable authentication and key exchangeMario Di Raimondo, Rosario Gennaro, Hugo Krawczyk. 400-409 [doi]
- Secure function evaluation with ordered binary decision diagramsLouis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh. 410-420 [doi]