![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/sp/sp2003.bht:"
@inproceedings{DBLP:conf/sp/AgrawalKP03, author = {Dakshi Agrawal and Dogan Kesdogan and Stefan Penz}, title = {Probabilistic Treatment of MIXes to Hamper Traffic Analysis}, booktitle = {S{\&}P}, pages = {16--27}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199324}, doi = {10.1109/SECPRI.2003.1199324}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AgrawalKP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesP03, author = {Michael Backes and Birgit Pfitzmann}, title = {Intransitive Non-Interference for Cryptographic Purpose}, booktitle = {S{\&}P}, pages = {140}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199333}, doi = {10.1109/SECPRI.2003.1199333}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackesP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BalfanzDSSSW03, author = {Dirk Balfanz and Glenn Durfee and Narendar Shankar and Diana K. Smetters and Jessica Staddon and Hao{-}Chi Wong}, title = {Secret Handshakes from Pairing-Based Key Agreements}, booktitle = {S{\&}P}, pages = {180--196}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199336}, doi = {10.1109/SECPRI.2003.1199336}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BalfanzDSSSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChanPS03, author = {Haowen Chan and Adrian Perrig and Dawn Xiaodong Song}, title = {Random Key Predistribution Schemes for Sensor Networks}, booktitle = {S{\&}P}, pages = {197}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199337}, doi = {10.1109/SECPRI.2003.1199337}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChanPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DanezisDM03, author = {George Danezis and Roger Dingledine and Nick Mathewson}, title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol}, booktitle = {S{\&}P}, pages = {2--15}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199323}, doi = {10.1109/SECPRI.2003.1199323}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DanezisDM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FengKFLG03, author = {Henry Hanping Feng and Oleg M. Kolesnikov and Prahlad Fogla and Wenke Lee and Weibo Gong}, title = {Anomaly Detection Using Call Stack Information}, booktitle = {S{\&}P}, pages = {62}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199328}, doi = {10.1109/SECPRI.2003.1199328}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/FengKFLG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GovindavajhalaA03, author = {Sudhakar Govindavajhala and Andrew W. Appel}, title = {Using Memory Errors to Attack a Virtual Machine}, booktitle = {S{\&}P}, pages = {154--165}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199334}, doi = {10.1109/SECPRI.2003.1199334}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GovindavajhalaA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KoganSW03, author = {Noam Kogan and Yuval Shavitt and Avishai Wool}, title = {A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards}, booktitle = {S{\&}P}, pages = {225--235}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199339}, doi = {10.1109/SECPRI.2003.1199339}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KoganSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiWM03, author = {Ninghui Li and William H. Winsborough and John C. Mitchell}, title = {Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management}, booktitle = {S{\&}P}, pages = {123--139}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199332}, doi = {10.1109/SECPRI.2003.1199332}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiWM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LieMTH03, author = {David Lie and John C. Mitchell and Chandramohan A. Thekkath and Mark Horowitz}, title = {Specifying and Verifying Hardware for Tamper-Resistant Software}, booktitle = {S{\&}P}, pages = {166}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199335}, doi = {10.1109/SECPRI.2003.1199335}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LieMTH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PriceRW03, author = {David W. Price and Algis Rudys and Dan S. Wallach}, title = {Garbage Collector Memory Accounting in Language-Based Systems}, booktitle = {S{\&}P}, pages = {263--274}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199342}, doi = {10.1109/SECPRI.2003.1199342}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/PriceRW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShankarP03, author = {Umesh Shankar and Vern Paxson}, title = {Active Mapping: Resisting {NIDS} Evasion without Altering Traffic}, booktitle = {S{\&}P}, pages = {44--61}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199327}, doi = {10.1109/SECPRI.2003.1199327}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ShankarP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Shapiro03, author = {Jonathan S. Shapiro}, title = {Vulnerabilities in Synchronous {IPC} Designs}, booktitle = {S{\&}P}, pages = {251--262}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199341}, doi = {10.1109/SECPRI.2003.1199341}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Shapiro03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SzajdaLO03, author = {Doug Szajda and Barry G. Lawson and Jason Owen}, title = {Hardening Functions for Large Scale Distributed Computations}, booktitle = {S{\&}P}, pages = {216--224}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199338}, doi = {10.1109/SECPRI.2003.1199338}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SzajdaLO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangR03, author = {XiaoFeng Wang and Michael K. Reiter}, title = {Defending Against Denial-of-Service Attacks with Puzzle Auction}, booktitle = {S{\&}P}, pages = {78--92}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199329}, doi = {10.1109/SECPRI.2003.1199329}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WangR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WrightALS03, author = {Matthew K. Wright and Micah Adler and Brian Neil Levine and Clay Shields}, title = {Defending Anonymous Communications Against Passive Logging Attack}, booktitle = {S{\&}P}, pages = {28--41}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199325}, doi = {10.1109/SECPRI.2003.1199325}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WrightALS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YaarPS03, author = {Abraham Yaar and Adrian Perrig and Dawn Xiaodong Song}, title = {Pi: {A} Path Identification Mechanism to Defend against DDoS Attack}, booktitle = {S{\&}P}, pages = {93}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199330}, doi = {10.1109/SECPRI.2003.1199330}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/YaarPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YuW03, author = {Ting Yu and Marianne Winslett}, title = {A Unified Scheme for Resource Protection in Automated Trust Negotiation}, booktitle = {S{\&}P}, pages = {110--122}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199331}, doi = {10.1109/SECPRI.2003.1199331}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/YuW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhengCMZ03, author = {Lantian Zheng and Stephen Chong and Andrew C. Myers and Steve Zdancewic}, title = {Using Replication and Partitioning to Build Secure Distributed Systems}, booktitle = {S{\&}P}, pages = {236--250}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199340}, doi = {10.1109/SECPRI.2003.1199340}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhengCMZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2003, title = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://ieeexplore.ieee.org/xpl/conhome/8543/proceeding}, isbn = {0-7695-1940-7}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.