


default search action
28th S&P 2007: Oakland, California, USA
- 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA. IEEE Computer Society 2007, ISBN 0-7695-2848-1

Network Security
- Xin Hu, Zhuoqing Morley Mao:

Accurate Real-time Identification of IP Prefix Hijacking. 3-17 - Wei Yu

, Xinwen Fu
, Steve Graham, Dong Xuan, Wei Zhao
:
DSSS-Based Flow Marking Technique for Invisible Traceback. 18-32 - Charles C. Zhang, Marianne Winslett, Carl A. Gunter:

On the Safety and Efficiency of Firewall Policy Deployment. 33-50
Authentication
- Stuart E. Schechter, Rachna Dhamija, Andy Ozment, Ian Fischer:

The Emperor's New Security Indicators. 51-65 - Philippe Golle, David A. Wagner:

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). 66-70 - José Meseguer, Ralf Sasse

, Helen J. Wang, Yi-Min Wang:
A Systematic Approach to Uncover Security Flaws in GUI Logic. 71-85 - Di Ma

, Gene Tsudik:
Extended Abstract: Forward-Secure Sequential Aggregate Authentication. 86-91 - Alexandra Boldyreva, Virendra Kumar

:
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. 92-100
Privacy
- Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich:

Endorsed E-Cash. 101-115 - Xinyuan Wang, Shiping Chen, Sushil Jajodia:

Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. 116-130 - Ian Goldberg:

Improving the Robustness of Private Information Retrieval. 131-148
Access Control and Audit
- Marco Pistoia, Anindya Banerjee, David A. Naumann

:
Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model. 149-163 - Ninghui Li, Ziqing Mao, Hong Chen:

Usable Mandatory Integrity Protection for Operating Systems. 164-178 - Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:

Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. 179-186
Information Flow
- Michael Backes, Markus Dürmuth, Dominique Unruh

:
Information Flow in the Peer-Reviewing Process. 187-191 - Jeffrey A. Vaughan, Steve Zdancewic:

A Cryptographic Decentralized Label Model. 192-206 - Aslan Askarov, Andrei Sabelfeld:

Gradual Release: Unifying Declassification, Encryption and Key Release Policies. 207-221 - Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger:

Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. 222-230
Host Security
- Andreas Moser, Christopher Krügel, Engin Kirda:

Exploring Multiple Execution Paths for Malware Analysis. 231-245 - Arati Baliga, Pandurang Kamat, Liviu Iftode:

Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. 246-251 - Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto:

ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. 252-266 - Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:

Minimal TCB Code Execution. 267-272 - Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh:

Using Rescue Points to Navigate Software Recovery. 273-280
Hardware and Replication
- Ted Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood

, Ryan Kastner
, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine:
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. 281-295 - Dakshi Agrawal, Selçuk Baktir

, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar:
Trojan Detection using IC Fingerprinting. 296-310 - Kannan Srinathan, N. R. Prasad, C. Pandu Rangan:

On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication. 311-320
Encryption
- John Bethencourt, Amit Sahai, Brent Waters:

Ciphertext-Policy Attribute-Based Encryption. 321-334 - Jean Paul Degabriele, Kenneth G. Paterson:

Attacking the IPsec Standards in Encryption-only Configurations. 335-349 - Elaine Shi, John Bethencourt, T.-H. Hubert Chan, Dawn Xiaodong Song, Adrian Perrig:

Multi-Dimensional Range Query over Encrypted Data. 350-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














