Abstract is missing.
- Accurate Real-time Identification of IP Prefix HijackingXin Hu, Zhuoqing Morley Mao. 3-17 [doi]
- DSSS-Based Flow Marking Technique for Invisible TracebackWei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao. 18-32 [doi]
- On the Safety and Efficiency of Firewall Policy DeploymentCharles C. Zhang, Marianne Winslett, Carl A. Gunter. 33-50 [doi]
- The Emperor s New Security IndicatorsStuart E. Schechter, Rachna Dhamija, Andy Ozment, Ian Fischer. 51-65 [doi]
- Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract)Philippe Golle, David Wagner. 66-70 [doi]
- A Systematic Approach to Uncover Security Flaws in GUI LogicJosé Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang. 71-85 [doi]
- Extended Abstract: Forward-Secure Sequential Aggregate AuthenticationDi Ma, Gene Tsudik. 86-91 [doi]
- Extended Abstract: Provable-Security Analysis of Authenticated Encryption in KerberosAlexandra Boldyreva, Virendra Kumar. 92-100 [doi]
- Endorsed E-CashJan Camenisch, Anna Lysyanskaya, Mira Meyerovich. 101-115 [doi]
- Network Flow Watermarking Attack on Low-Latency Anonymous Communication SystemsXinyuan Wang, Shiping Chen, Sushil Jajodia. 116-130 [doi]
- Improving the Robustness of Private Information RetrievalIan Goldberg. 131-148 [doi]
- Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security ModelMarco Pistoia, Anindya Banerjee, David A. Naumann. 149-163 [doi]
- Usable Mandatory Integrity Protection for Operating SystemsNinghui Li, Ziqing Mao, Hong Chen. 164-178 [doi]
- Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual EnvironmentsSomesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney. 179-186 [doi]
- Information Flow in the Peer-Reviewing ProcessMichael Backes, Markus Dürmuth, Dominique Unruh. 187-191 [doi]
- A Cryptographic Decentralized Label ModelJeffrey A. Vaughan, Steve Zdancewic. 192-206 [doi]
- Gradual Release: Unifying Declassification, Encryption and Key Release PoliciesAslan Askarov, Andrei Sabelfeld. 207-221 [doi]
- Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access ControlPau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger. 222-230 [doi]
- Exploring Multiple Execution Paths for Malware AnalysisAndreas Moser, Christopher Krügel, Engin Kirda. 231-245 [doi]
- Lurking in the Shadows: Identifying Systemic Threats to Kernel DataArati Baliga, Pandurang Kamat, Liviu Iftode. 246-251 [doi]
- ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed ProbingWeidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto. 252-266 [doi]
- Minimal TCB Code ExecutionJonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri. 267-272 [doi]
- Using Rescue Points to Navigate Software RecoveryStelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh. 273-280 [doi]
- Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based SystemsTed Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine. 281-295 [doi]
- Trojan Detection using IC FingerprintingDakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar. 296-310 [doi]
- On the Optimal Communication Complexity of Multiphase Protocols for Perfect CommunicationKannan Srinathan, N. R. Prasad, C. Pandu Rangan. 311-320 [doi]
- Ciphertext-Policy Attribute-Based EncryptionJohn Bethencourt, Amit Sahai, Brent Waters. 321-334 [doi]
- Attacking the IPsec Standards in Encryption-only ConfigurationsJean Paul Degabriele, Kenneth G. Paterson. 335-349 [doi]
- Multi-Dimensional Range Query over Encrypted DataElaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig. 350-364 [doi]