


default search action
25th S&P 2004: Berkeley, California, USA
- 2004 IEEE Symposium on Security and Privacy (S&P 2004), 9-12 May 2004, Berkeley, CA, USA. IEEE Computer Society 2004, ISBN 0-7695-2136-3

Attacks and Defenses
- Dmitri Asonov, Rakesh Agrawal:

Keyboard Acoustic Emanations. 3-11 - Tuomas Aura

, Pekka Nikander, Gonzalo Camarillo:
Effects of Mobility and Multihoming on Transport-Protocol Security. 12-26 - Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach:

Analysis of an Electronic Voting System. 27-
Theory of Access Control
- Philip W. L. Fong:

Access Control By Tracking Shallow Execution History. 43-55 - Jon A. Solworth, Robert H. Sloan:

A Layered Design of Discretionary Access Controls with Decidable Safety Properties. 56-
Cryptography
- Peeter Laud

:
Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. 71-85 - Bruno Blanchet:

Automatic Proof of Strong Secrecy for Security Protocols. 86-
Denial of Service
- Michael P. Collins, Michael K. Reiter:

An Empirical Analysis of Target-Resident DoS Filters. 103-114 - Jun Li, Minho Sung, Jun (Jim) Xu, Li (Erran) Li:

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. 115-129 - Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song:

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. 130-
Access Control and Privacy
- William H. Winsborough, Ninghui Li:

Safety in Automated Trust Negotiation. 147-160 - Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:

Securing OLAP Data Cubes Against Privacy Breaches. 161-
Static Analysis
- Stephen Tse, Steve Zdancewic:

Run-time Principals in Information-flow Type Systems. 179-193 - Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller:

Formalizing Sensitivity in Static Analysis for Intrusion Detection. 194-
Network Security
- Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:

Fast Portscan Detection Using Sequential Hypothesis Testing. 211-225 - Maxwell N. Krohn, Michael J. Freedman, David Mazières:

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. 226-240 - Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:

Multicast Authentication in Fully Adversarial Networks. 241-
Security Against Physical Attacks
- Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. 259-271 - Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:

SWATT: SoftWare-based ATTestation for Embedded Devices. 272-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














