0 | -- | 0 | Rebecca N. Wright, Sabrina De Capitani di Vimercati. Guest Editorial: Special Issue on Computer and Communications Security |
0 | -- | 0 | Adam J. Lee, Marianne Winslett. Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems |
0 | -- | 0 | Philippe Golle, Frank McSherry, Ilya Mironov. Data Collection with Self-Enforcing Privacy |
0 | -- | 0 | Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis. Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure |
0 | -- | 0 | Mengjun Xie, Heng Yin, Haining Wang. Thwarting E-mail Spam Laundering |
0 | -- | 0 | Xiaofeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil. Fast and Black-box Exploit Detection and Signature Generation for Commodity Software |
0 | -- | 0 | Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler. EXE: Automatically Generating Inputs of Death |