


default search action
22nd S&P 2001: Oakland, California, USA
- 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA May 14-16, 2001. IEEE Computer Society 2001, ISBN 0-7695-1046-9

Tamper-Resistance and Cryptography
- Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth:

Cryptographic Security for Mobile Code. 2-11 - Philip D. MacKenzie, Michael K. Reiter:

Networked Cryptographic Devices Resilient to Capture. 12-25 - Wai W. Fung, Mordecai J. Golin, James W. Gray III:

Protection of Keys against Modification Attack. 26-36
Intrusion and Anomaly Detection I
- Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo:

Data Mining Methods for Detection of New Malicious Executables. 38-49 - John E. Gaffney Jr., Jacob W. Ulvila:

Evaluation of Intrusion Detectors: A Decision Theory Approach. 50-61
Information Flow
- Johan Agat, David Sands:

On Confidentiality and Algorithms. 64-77 - Heiko Mantel:

Preserving Information Flow Properties under Refinement. 78-91
Access Control and Trust Management
- Stephen Weeks:

Understanding Trust Management Systems. 94-105 - Trevor Jim:

SD3: A Trust Management System with Certified Evaluation. 106-115 - Xuhui Ao, Naftaly H. Minsky, Victoria Ungureanu:

Formal Treatment of Certificate Revocation under Communal Access Control. 116-127
Intrusion and Anomaly Detection II
- Wenke Lee, Dong Xiang:

Information-Theoretic Measures for Anomaly Detection. 130-143 - R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni:

A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. 144-155 - David A. Wagner, Drew Dean:

Intrusion Detection via Static Analysis. 156-168
Cryptographic Protocols I
- Alan Harbitter, Daniel A. Menascé:

Performance of Public-Key-Enabled Kerberos Authentication in Large Networks. 170-183 - Birgit Pfitzmann, Michael Waidner:

A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. 184-200
What's Really Different
- Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel:

Cryptographic Key Generation from Voice. 202-213 - Hilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen:

A Trend Analysis of Exploitations. 214-229
Cryptographic Protocols II
- Sara K. Miner, Jessica Staddon:

Graph-Based Authentication of Digital Streams. 232-246 - Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar:

ELK, A New Protocol for Efficient Large-Group Key Distribution. 247-262

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














