Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '04Fairplay—A Secure Two-Party Computation SystemDahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella
    USENIX Security '04Tor: The Second-Generation Onion RouterRoger Dingledine, Nick Mathewson, Paul Syverson
    USENIX Security '04Understanding Data Lifetime via Whole System SimulationJim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum
    USENIX Security '04CryptoGraphics: Secret Key Cryptography Using Graphics CardsDebra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Zurgen
    USENIX Security '04http://usenix.org/publications/library/proceedings/sec04/tech/wips/wips/01-cook-cryptographics.pdfChristopher J. Calabrese
    USENIX Security '04Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide FilesYi-Min Wang, Binh Vo, Roussi Roussev, Chad Verbowski, Aaron Johnson
    USENIX Security '04The Nizza Security ArchitectureMichael Hohmuth, Hermann Härtig
    USENIX Security '04Improving the Resilience of Indirection-Based DDoS Protection Mechanisms Using Per-Packet Path DiversityAngelos Stavrou
    USENIX Security '04Kerf: Machine Learning to Aid Intrusion AnalystsSergey Bratus, Javed Aslam, David Kotz, Ron Peterson, Daniela Rus
    USENIX Security '04Recovering from Faulty Device DriversNathanael Paul
    USENIX Security '04Secure and Robust loose time synchronization mechanism for Wireless Sensor Networks
    USENIX Security '04Toward a Verified, Secure, General-Purpose MicrokernelJonathan S. Shapiro, Eric Northup, M. Scott Doerrie, Swaroop Sridhar
    USENIX ATC '04Making the "Box" Transparent: System Call Performance as a First-Class ResultYaoping Ruan, Vivek Pai
    USENIX ATC '04Dynamic Instrumentation of Production SystemsBryan M. Cantrill, Michael W. Shapiro, Adam H. Leventhal
    USENIX ATC '04Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software DebuggingSudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, Yuanyuan Zhou
    USENIX ATC '04Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk MailDan Twining, Matthew M. Williamson, Miranda J. F. Mowbray, Maher Rahmouni
    USENIX ATC '04Redundancy Elimination Within Large Collections of FilesPurushottam Kulkarni, University of Massachusetts, Fred Douglis, Jason LaVoie, John M. Tracey
    USENIX ATC '04Alternatives for Detecting Redundancy in Storage Systems DataCalicrates Policroniades, Ian Pratt
    USENIX ATC '04Monkey See, Monkey Do: A Tool for TCP Tracing and ReplayingYu-Chung Cheng, Urs Hölzle, Neal Cardwell, Stefan Savage, Geoffrey M. Voelker
    USENIX ATC '04A Transport Layer Approach for Improving End-to-End Performance and Robustness Using Redundant PathsMing Zhang, Junwen Lai, Arvind Krishnamurthy, Larry Peterson, Randolph Wang
    USENIX ATC '04Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise StrategiesAditya Akella, Srinivasan Seshan, Anees Shaikh
    USENIX ATC '04Handling Churn in a DHTSean Rhea, Dennis Geels, Timothy Roscoe, John Kubiatowicz
    USENIX ATC '04A Network Positioning System for the InternetT.S. Eugene Ng, Hui Zhang
    USENIX ATC '04Early Experience with an Internet Broadcast System Based on Overlay MulticastYang-hua Chu, Aditya Ganjam, Sanjay G. Rao, Kunwadee Sripanidkulchai, Jibin Zhan
    USENIX ATC '04Using Globus with FreeBSDBrooks Davis, Craig Lee

Pages