Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '02Deanonymizing Users of the SafeWeb Anonymizing ServiceDavid Martin, Andrew Schulman
    USENIX Security '02VeriSign CZAG: Privacy Leak in X.509 CertificatesScott G. Renfro
    USENIX Security '02How to Own the Internet in Your Spare TimeStuart Staniford, Vern Paxson, Nicholas Weaver
    USENIX Security '02Setuid DemystifiedHao Chen, David Wagner, Drew Dean
    USENIX Security '02Secure Execution via Program ShepherdingVladimir Kiriansky, Derek Bruening, Saman Amarasinghe
    USENIX Security '02A Flexible Containment Mechanism for Executing Untrusted CodeDavid S. Peterson, Matt Bishop, Raju Pandey
    USENIX Security '02SSLACC: A Clustered SSL AcceleratorEric Rescorla, Adam Cain, Brian Korver
    USENIX Security '02Infranet: Circumventing Web Censorship and SurveillanceNick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger
    USENIX Security '02Trusted Paths for BrowsersZishuang (Eileen) Ye, Sean Smith
    USENIX Security '02Toward Speech-Generated Cryptographic Keys on Resource-Constrained DevicesFabian Monrose, Michael Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih
    USENIX Security '02Secure History Preservation Through Timeline EntanglementPetros Maniatis, Mary Baker
    USENIX Security '02Lessons Learned in Implementing and Deploying Crypto SoftwarePeter Gutmann
    USENIX Security '02Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated EncryptionJohn Black, Hector Urtubia
    USENIX Security '02Making Mix Nets Robust for Electronic Voting by Randomized Partial CheckingMarkus Jakobsson, Ari Juels, Ronald L. Rivest
    USENIX Security '01Using Client Puzzles to Protect TLSDrew Dean, Adam Stubblefield
    USENIX Security '01Inferring Internet Denial-of-Service ActivityDavid Moore, Geoffrey M. Voelker, Stefan Savage
    USENIX Security '01MULTOPS: A Data-Structure for Bandwidth Attack DetectionThomer M. Gil, Massimiliano Poletto
    USENIX Security '01Data Remanence in Semiconductor DevicesPeter Gutmann
    USENIX Security '01StackGhost: Hardware Facilitated Stack ProtectionMike Frantzen, Mike Shuey
    USENIX Security '01Improving DES Coprocessor Throughput for Short OperationsMark Lindemann, Sean W. Smith
    USENIX Security '01Architecting the Lumeta Firewall AnalyzerAvishai Wool
    USENIX Security '01Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per HostPeter M. Gleitz, Steven M. Bellovin
    USENIX Security '01Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol SemanticsMark Handley, Vern Paxson, Christian Kreibich
    USENIX Security '01Reading Between the Lines: Lessons from the SDMI ChallengeScott A. Craver, Min Wu, Bede Liu, Ben Swartzlander, Dan S. Wallach, Drew Dean, Edward W. Felten
    USENIX Security '01Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats

Pages