Abstract is missing.
- Homeland security: cyber security R&D initiativesW. Douglas Maughan. 1 [doi]
- A modular correctness proof of IEEE 802.11i and TLSChanghua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell. 2-15 [doi]
- Deciding security of protocols against off-line guessing attacksMathieu Baudet. 16-25 [doi]
- Secrecy types for a simulatable cryptographic libraryPeeter Laud. 26-35 [doi]
- Preventing attribute information leakage in automated trust negotiationKeith Irwin, Ting Yu. 36-45 [doi]
- Automated trust negotiation using cryptographic credentialsJiangtao Li, Ninghui Li, William H. Winsborough. 46-57 [doi]
- Secure collaboration in mediator-free environmentsMohamed Shehab, Elisa Bertino, Arif Ghafoor. 58-67 [doi]
- Applications of secure electronic voting to automated privacy-preserving troubleshootingQiang Huang, David Jao, Helen J. Wang. 68-80 [doi]
- Tracking anonymous peer-to-peer VoIP calls on the internetXinyuan Wang, Shiping Chen, Sushil Jajodia. 81-91 [doi]
- Untraceable RFID tags via insubvertible encryptionGiuseppe Ateniese, Jan Camenisch, Breno de Medeiros. 92-101 [doi]
- Obfuscated databases and group privacyArvind Narayanan, Vitaly Shmatikov. 102-111 [doi]
- New approaches for deniable authenticationMario Di Raimondo, Rosario Gennaro. 112-121 [doi]
- On authenticated computing and RSA-based authenticationJean-Pierre Seifert. 122-127 [doi]
- Aggregated path authentication for efficient BGP securityMeiyuan Zhao, Sean W. Smith, David M. Nicol. 128-138 [doi]
- Improving Brumley and Boneh timing attack on unprotected SSL implementationsOnur Aciiçmez, Werner Schindler, Çetin Kaya Koç. 139-146 [doi]
- CPOL: high-performance policy evaluationKevin Borders, Xin Zhao, Atul Prakash. 147-157 [doi]
- Understanding and developing role-based administrative modelsJason Crampton. 158-167 [doi]
- PeerAccess: a logic for distributed authorizationMarianne Winslett, Charles C. Zhang, Piero A. Bonatti. 168-179 [doi]
- Modeling insider attacks on group key-exchange protocolsJonathan Katz, Ji Sun Shin. 180-189 [doi]
- Dynamic and efficient key management for access hierarchiesMikhail J. Atallah, Keith B. Frikken, Marina Blanton. 190-202 [doi]
- A model and architecture for pseudo-random generation with applications to /dev/randomBoaz Barak, Shai Halevi. 203-212 [doi]
- Fast and automated generation of attack signatures: a basis for building self-protecting serversZhenkai Liang, R. Sekar. 213-222 [doi]
- Automatic diagnosis and response to memory corruption vulnerabilitiesJun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt. 223-234 [doi]
- On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploitsJedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong. 235-248 [doi]
- Countering DoS attacks with stateless multipath overlaysAngelos Stavrou, Angelos D. Keromytis. 249-259 [doi]
- A framework for concrete reputation-systems with applications to history-based access controlKarl Krukow, Mogens Nielsen, Vladimiro Sassone. 260-269 [doi]
- An auctioning reputation system based on anomalyShai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd. 270-279 [doi]
- On the cost-ineffectiveness of redundancy in commercial P2P computingMatthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg. 280-288 [doi]
- Securing publish-subscribe overlay services with EventGuardMudhakar Srivatsa, Ling Liu. 289-298 [doi]
- Password authenticated key exchange using hidden smooth subgroupsCraig Gentry, Philip D. MacKenzie, Zulfikar Ramzan. 299-309 [doi]
- Proxy re-signatures: new definitions, algorithms, and applicationsGiuseppe Ateniese, Susan Hohenberger. 310-319 [doi]
- Direct chosen ciphertext security from identity-based techniquesXavier Boyen, Qixiang Mei, Brent Waters. 320-329 [doi]
- Automatic placement of authorization hooks in the linux security modules frameworkVinod Ganapathy, Trent Jaeger, Somesh Jha. 330-339 [doi]
- Control-flow integrityMartín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti. 340-353 [doi]
- Preventing format-string attacks via automatic and efficient dynamic checkingMichael F. Ringenburg, Dan Grossman. 354-363 [doi]
- Fast dictionary attacks on passwords using time-space tradeoffArvind Narayanan, Vitaly Shmatikov. 364-372 [doi]
- Keyboard acoustic emanations revisitedLi Zhuang, Feng Zhou, J. D. Tygar. 373-382 [doi]
- Misbehaving TCP receivers can cause internet-wide congestion collapseRob Sherwood, Bobby Bhattacharjee, Ryan Braud. 383-392 [doi]
- Exploiting open functionality in SMS-capable cellular networksWilliam Enck, Patrick Traynor, Patrick McDaniel, Thomas F. La Porta. 393-404 [doi]
- Security market: incentives for disclosure of vulnerabilitiesPeter P. Swire. 405 [doi]
- Identity-based encryption from algorithm to enterprise deploymentGuido Appenzeller. 406 [doi]
- Biometrics hit the mainstream: an analysis of security and privacy implicationsVance Bjorn. 407 [doi]