default search action
25th S&P 2004: Berkeley, California, USA
- 2004 IEEE Symposium on Security and Privacy (S&P 2004), 9-12 May 2004, Berkeley, CA, USA. IEEE Computer Society 2004, ISBN 0-7695-2136-3
Attacks and Defenses
- Dmitri Asonov, Rakesh Agrawal:
Keyboard Acoustic Emanations. 3-11 - Tuomas Aura, Pekka Nikander, Gonzalo Camarillo:
Effects of Mobility and Multihoming on Transport-Protocol Security. 12-26 - Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach:
Analysis of an Electronic Voting System. 27-
Theory of Access Control
- Philip W. L. Fong:
Access Control By Tracking Shallow Execution History. 43-55 - Jon A. Solworth, Robert H. Sloan:
A Layered Design of Discretionary Access Controls with Decidable Safety Properties. 56-
Cryptography
- Peeter Laud:
Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. 71-85 - Bruno Blanchet:
Automatic Proof of Strong Secrecy for Security Protocols. 86-
Denial of Service
- Michael P. Collins, Michael K. Reiter:
An Empirical Analysis of Target-Resident DoS Filters. 103-114 - Jun Li, Minho Sung, Jun (Jim) Xu, Li (Erran) Li:
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. 115-129 - Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song:
SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. 130-
Access Control and Privacy
- William H. Winsborough, Ninghui Li:
Safety in Automated Trust Negotiation. 147-160 - Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Securing OLAP Data Cubes Against Privacy Breaches. 161-
Static Analysis
- Stephen Tse, Steve Zdancewic:
Run-time Principals in Information-flow Type Systems. 179-193 - Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller:
Formalizing Sensitivity in Static Analysis for Intrusion Detection. 194-
Network Security
- Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:
Fast Portscan Detection Using Sequential Hypothesis Testing. 211-225 - Maxwell N. Krohn, Michael J. Freedman, David Mazières:
On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. 226-240 - Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Multicast Authentication in Fully Adversarial Networks. 241-
Security Against Physical Attacks
- Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. 259-271 - Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
SWATT: SoftWare-based ATTestation for Embedded Devices. 272-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.