Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '02Access and Integrity Control in a Public-Access, High-Assurance Configuration Management SystemJonathan S. Shapiro, John Vanderburgh
    USENIX Security '02Deanonymizing Users of the SafeWeb Anonymizing ServiceDavid Martin, Andrew Schulman
    USENIX Security '02VeriSign CZAG: Privacy Leak in X.509 CertificatesScott G. Renfro
    USENIX Security '02How to Own the Internet in Your Spare TimeStuart Staniford, Vern Paxson, Nicholas Weaver
    USENIX Security '02Setuid DemystifiedHao Chen, David Wagner, Drew Dean
    USENIX Security '02Secure Execution via Program ShepherdingVladimir Kiriansky, Derek Bruening, Saman Amarasinghe
    USENIX Security '02A Flexible Containment Mechanism for Executing Untrusted CodeDavid S. Peterson, Matt Bishop, Raju Pandey
    USENIX Security '02SSLACC: A Clustered SSL AcceleratorEric Rescorla, Adam Cain, Brian Korver
    USENIX Security '02Infranet: Circumventing Web Censorship and SurveillanceNick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger
    USENIX Security '02Trusted Paths for BrowsersZishuang (Eileen) Ye, Sean Smith
    USENIX Security '02Toward Speech-Generated Cryptographic Keys on Resource-Constrained DevicesFabian Monrose, Michael Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih
    USENIX Security '02Secure History Preservation Through Timeline EntanglementPetros Maniatis, Mary Baker
    USENIX Security '02Lessons Learned in Implementing and Deploying Crypto SoftwarePeter Gutmann
    USENIX Security '02Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated EncryptionJohn Black, Hector Urtubia
    USENIX Security '02Making Mix Nets Robust for Electronic Voting by Randomized Partial CheckingMarkus Jakobsson, Ari Juels, Ronald L. Rivest
    Java VM '02Concurrent Remembered Set Refinement in Generational Garbage CollectionDavid Detlefs, Ross Knippel, William D. Clinger, Matthias Jacob
    Java VM '02To Collect or Not to Collect? Machine Learning for Memory ManagementEva Andreasson, Frank Hoffmann, Olof Lindholm
    Java VM '02Optimizing Precision Overhead for x86 ProcessorsTakeshi Ogasawara, Hideaki Komatsu, Toshio Nakatani
    Java VM '02Experiences Porting the Jikes RVM to Linux/IA32Bowen Alpern, Maria Butrico, Anthony Cocchi, Julian Dolby, Stephen Fink, David Grove, Ton Ngo
    Java VM '02A Modular and Extensible JVM InfrastructurePatrick Doyle, Tarek S. Abdelrahman
    Java VM '02Cross-Architectural Performance Portability of a Java Virtual Machine ImplementationKeith Randall
    Java VM '02An Empirical Study of Method In-lining for a Java Just-in-Time CompilerToshio Suganuma, Toshiaki Yasue, Toshio Nakatani
    Java VM '02Stress-testing Control Structures for Dynamic Dispatch in JavaOlivier Zendra, Karel Driesen
    Java VM '02A Just-in-Time Compiler for Memory-Constrained Low-Power DevicesNik Shaylor
    Java VM '02sEc: A Portable Interpreter Optimizing Technique for Embedded Java Virtual MachineVenugopal K S, Geetha Manjunath, Venkatesh Krishnan

Pages