Abstract is missing.
- Keyboard Acoustic EmanationsDmitri Asonov, Rakesh Agrawal. 3-11 [doi]
- Effects of Mobility and Multihoming on Transport-Protocol SecurityTuomas Aura, Pekka Nikander, Gonzalo Camarillo. 12-26 [doi]
- Analysis of an Electronic Voting SystemTadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach. 27 [doi]
- Access Control By Tracking Shallow Execution HistoryPhilip W. L. Fong. 43-55 [doi]
- A Layered Design of Discretionary Access Controls with Decidable Safety PropertiesJon A. Solworth, Robert H. Sloan. 56 [doi]
- Symmetric Encryption in Automatic Analyses for Confidentiality against Active AdversariesPeeter Laud. 71-85 [doi]
- Automatic Proof of Strong Secrecy for Security ProtocolsBruno Blanchet. 86 [doi]
- An Empirical Analysis of Target-Resident DoS FiltersMichael P. Collins, Michael K. Reiter. 103-114 [doi]
- Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical FoundationJun Li, Minho Sung, Jun Xu, Li Li 0002. 115-129 [doi]
- SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding AttacksAbraham Yaar, Adrian Perrig, Dawn Xiaodong Song. 130 [doi]
- Safety in Automated Trust NegotiationWilliam H. Winsborough, Ninghui Li. 147-160 [doi]
- Securing OLAP Data Cubes Against Privacy BreachesLingyu Wang, Sushil Jajodia, Duminda Wijesekera. 161 [doi]
- Run-time Principals in Information-flow Type SystemsStephen Tse, Steve Zdancewic. 179-193 [doi]
- Formalizing Sensitivity in Static Analysis for Intrusion DetectionHenry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller. 194 [doi]
- Fast Portscan Detection Using Sequential Hypothesis TestingJaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan. 211-225 [doi]
- On-the-Fly Verification of Rateless Erasure Codes for Efficient Content DistributionMaxwell N. Krohn, Michael J. Freedman, David Mazières. 226-240 [doi]
- Multicast Authentication in Fully Adversarial NetworksAnna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos. 241 [doi]
- An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor NetworksSencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning. 259-271 [doi]
- SWATT: SoftWare-based ATTestation for Embedded DevicesArvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla. 272 [doi]