Check out the new USENIX Web site.
2005 USENIX Annual Technical Conference


Author/Speakers

THEMES: SECURITY

Security icon Calling all security researchers and practitioners: USENIX '05 offers a variety of programs to meet your needs.

Below is a list of Training Sessions, Refereed Papers, Invited Talks, and Guru Is In sessions related to security. Mix and match from the lists of sessions below to design the security-focused conference you need!

Training

S1: Hands-on Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 1 of 2)

S6: Kerberos 5—Revenge of the Three-Headed Dog

S8: Next-Generation Security Tools

M1: Hands-On Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 2 of 2)

M2: Network Security Protocols: Theory and Current Standards

T1: Network Security Assessments Workshop—Hands-on (Day 1 of 2)

T3: Solaris 10 Security Features Workshop

W1: Network Security Assessments Workshop—Hands-on (Day 2 of 2)

R1: Hacking & Securing Web-based Applications

R2: Network Security Monitoring with Open Source Tools

Refereed Paper Sessions

R: Defending Against Attacks

R: Security Visualization

R: Short Papers I

Invited Talks

W: DDoS Defense in Practice and Theory

F: Possible Futures for Software

R: Thin Clients: Past, Present, and Future

?Need help? Use our Contacts page.

Last changed: 1 April 2005 ch