USENIX Security '04 | Fairplay—A Secure Two-Party Computation System | Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella |
USENIX Security '04 | Tor: The Second-Generation Onion Router | Roger Dingledine, Nick Mathewson, Paul Syverson |
USENIX Security '04 | Understanding Data Lifetime via Whole System Simulation | Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum |
USENIX Security '04 | CryptoGraphics: Secret Key Cryptography Using Graphics Cards | Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Zurgen |
USENIX Security '04 | http://usenix.org/publications/library/proceedings/sec04/tech/wips/wips/01-cook-cryptographics.pdf | Christopher J. Calabrese |
USENIX Security '04 | Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide Files | Yi-Min Wang, Binh Vo, Roussi Roussev, Chad Verbowski, Aaron Johnson |
USENIX Security '04 | The Nizza Security Architecture | Michael Hohmuth, Hermann Härtig |
USENIX Security '04 | Improving the Resilience of Indirection-Based DDoS Protection Mechanisms Using Per-Packet Path Diversity | Angelos Stavrou |
USENIX Security '04 | Kerf: Machine Learning to Aid Intrusion Analysts | Sergey Bratus, Javed Aslam, David Kotz, Ron Peterson, Daniela Rus |
USENIX Security '04 | Recovering from Faulty Device Drivers | Nathanael Paul |
USENIX Security '04 | Secure and Robust loose time synchronization mechanism for Wireless Sensor Networks | |
USENIX Security '04 | Toward a Verified, Secure, General-Purpose Microkernel | Jonathan S. Shapiro, Eric Northup, M. Scott Doerrie, Swaroop Sridhar |
USENIX ATC '04 | Making the "Box" Transparent: System Call Performance as a First-Class Result | Yaoping Ruan, Vivek Pai |
USENIX ATC '04 | Dynamic Instrumentation of Production Systems | Bryan M. Cantrill, Michael W. Shapiro, Adam H. Leventhal |
USENIX ATC '04 | Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging | Sudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, Yuanyuan Zhou |
USENIX ATC '04 | Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk Mail | Dan Twining, Matthew M. Williamson, Miranda J. F. Mowbray, Maher Rahmouni |
USENIX ATC '04 | Redundancy Elimination Within Large Collections of Files | Purushottam Kulkarni, University of Massachusetts, Fred Douglis, Jason LaVoie, John M. Tracey |
USENIX ATC '04 | Alternatives for Detecting Redundancy in Storage Systems Data | Calicrates Policroniades, Ian Pratt |
USENIX ATC '04 | Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying | Yu-Chung Cheng, Urs Hölzle, Neal Cardwell, Stefan Savage, Geoffrey M. Voelker |
USENIX ATC '04 | A Transport Layer Approach for Improving End-to-End Performance and Robustness Using Redundant Paths | Ming Zhang, Junwen Lai, Arvind Krishnamurthy, Larry Peterson, Randolph Wang |
USENIX ATC '04 | Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies | Aditya Akella, Srinivasan Seshan, Anees Shaikh |
USENIX ATC '04 | Handling Churn in a DHT | Sean Rhea, Dennis Geels, Timothy Roscoe, John Kubiatowicz |
USENIX ATC '04 | A Network Positioning System for the Internet | T.S. Eugene Ng, Hui Zhang |
USENIX ATC '04 | Early Experience with an Internet Broadcast System Based on Overlay Multicast | Yang-hua Chu, Aditya Ganjam, Sanjay G. Rao, Kunwadee Sripanidkulchai, Jibin Zhan |
USENIX ATC '04 | Using Globus with FreeBSD | Brooks Davis, Craig Lee |