Search dblp for Publications

export results for "toc:db/conf/sp/sp2003.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sp/AgrawalKP03,
  author       = {Dakshi Agrawal and
                  Dogan Kesdogan and
                  Stefan Penz},
  title        = {Probabilistic Treatment of MIXes to Hamper Traffic Analysis},
  booktitle    = {S{\&}P},
  pages        = {16--27},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199324},
  doi          = {10.1109/SECPRI.2003.1199324},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AgrawalKP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BackesP03,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Intransitive Non-Interference for Cryptographic Purpose},
  booktitle    = {S{\&}P},
  pages        = {140},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199333},
  doi          = {10.1109/SECPRI.2003.1199333},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BackesP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BalfanzDSSSW03,
  author       = {Dirk Balfanz and
                  Glenn Durfee and
                  Narendar Shankar and
                  Diana K. Smetters and
                  Jessica Staddon and
                  Hao{-}Chi Wong},
  title        = {Secret Handshakes from Pairing-Based Key Agreements},
  booktitle    = {S{\&}P},
  pages        = {180--196},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199336},
  doi          = {10.1109/SECPRI.2003.1199336},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BalfanzDSSSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChanPS03,
  author       = {Haowen Chan and
                  Adrian Perrig and
                  Dawn Xiaodong Song},
  title        = {Random Key Predistribution Schemes for Sensor Networks},
  booktitle    = {S{\&}P},
  pages        = {197},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199337},
  doi          = {10.1109/SECPRI.2003.1199337},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChanPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DanezisDM03,
  author       = {George Danezis and
                  Roger Dingledine and
                  Nick Mathewson},
  title        = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  booktitle    = {S{\&}P},
  pages        = {2--15},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199323},
  doi          = {10.1109/SECPRI.2003.1199323},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DanezisDM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FengKFLG03,
  author       = {Henry Hanping Feng and
                  Oleg M. Kolesnikov and
                  Prahlad Fogla and
                  Wenke Lee and
                  Weibo Gong},
  title        = {Anomaly Detection Using Call Stack Information},
  booktitle    = {S{\&}P},
  pages        = {62},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199328},
  doi          = {10.1109/SECPRI.2003.1199328},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/FengKFLG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GovindavajhalaA03,
  author       = {Sudhakar Govindavajhala and
                  Andrew W. Appel},
  title        = {Using Memory Errors to Attack a Virtual Machine},
  booktitle    = {S{\&}P},
  pages        = {154--165},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199334},
  doi          = {10.1109/SECPRI.2003.1199334},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GovindavajhalaA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KoganSW03,
  author       = {Noam Kogan and
                  Yuval Shavitt and
                  Avishai Wool},
  title        = {A Practical Revocation Scheme for Broadcast Encryption Using Smart
                  Cards},
  booktitle    = {S{\&}P},
  pages        = {225--235},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199339},
  doi          = {10.1109/SECPRI.2003.1199339},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KoganSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiWM03,
  author       = {Ninghui Li and
                  William H. Winsborough and
                  John C. Mitchell},
  title        = {Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust
                  Management},
  booktitle    = {S{\&}P},
  pages        = {123--139},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199332},
  doi          = {10.1109/SECPRI.2003.1199332},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiWM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LieMTH03,
  author       = {David Lie and
                  John C. Mitchell and
                  Chandramohan A. Thekkath and
                  Mark Horowitz},
  title        = {Specifying and Verifying Hardware for Tamper-Resistant Software},
  booktitle    = {S{\&}P},
  pages        = {166},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199335},
  doi          = {10.1109/SECPRI.2003.1199335},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LieMTH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PriceRW03,
  author       = {David W. Price and
                  Algis Rudys and
                  Dan S. Wallach},
  title        = {Garbage Collector Memory Accounting in Language-Based Systems},
  booktitle    = {S{\&}P},
  pages        = {263--274},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199342},
  doi          = {10.1109/SECPRI.2003.1199342},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PriceRW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShankarP03,
  author       = {Umesh Shankar and
                  Vern Paxson},
  title        = {Active Mapping: Resisting {NIDS} Evasion without Altering Traffic},
  booktitle    = {S{\&}P},
  pages        = {44--61},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199327},
  doi          = {10.1109/SECPRI.2003.1199327},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ShankarP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Shapiro03,
  author       = {Jonathan S. Shapiro},
  title        = {Vulnerabilities in Synchronous {IPC} Designs},
  booktitle    = {S{\&}P},
  pages        = {251--262},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199341},
  doi          = {10.1109/SECPRI.2003.1199341},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Shapiro03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SzajdaLO03,
  author       = {Doug Szajda and
                  Barry G. Lawson and
                  Jason Owen},
  title        = {Hardening Functions for Large Scale Distributed Computations},
  booktitle    = {S{\&}P},
  pages        = {216--224},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199338},
  doi          = {10.1109/SECPRI.2003.1199338},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SzajdaLO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangR03,
  author       = {XiaoFeng Wang and
                  Michael K. Reiter},
  title        = {Defending Against Denial-of-Service Attacks with Puzzle Auction},
  booktitle    = {S{\&}P},
  pages        = {78--92},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199329},
  doi          = {10.1109/SECPRI.2003.1199329},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WangR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WrightALS03,
  author       = {Matthew K. Wright and
                  Micah Adler and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {Defending Anonymous Communications Against Passive Logging Attack},
  booktitle    = {S{\&}P},
  pages        = {28--41},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199325},
  doi          = {10.1109/SECPRI.2003.1199325},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WrightALS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YaarPS03,
  author       = {Abraham Yaar and
                  Adrian Perrig and
                  Dawn Xiaodong Song},
  title        = {Pi: {A} Path Identification Mechanism to Defend against DDoS Attack},
  booktitle    = {S{\&}P},
  pages        = {93},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199330},
  doi          = {10.1109/SECPRI.2003.1199330},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YaarPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YuW03,
  author       = {Ting Yu and
                  Marianne Winslett},
  title        = {A Unified Scheme for Resource Protection in Automated Trust Negotiation},
  booktitle    = {S{\&}P},
  pages        = {110--122},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199331},
  doi          = {10.1109/SECPRI.2003.1199331},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YuW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhengCMZ03,
  author       = {Lantian Zheng and
                  Stephen Chong and
                  Andrew C. Myers and
                  Steve Zdancewic},
  title        = {Using Replication and Partitioning to Build Secure Distributed Systems},
  booktitle    = {S{\&}P},
  pages        = {236--250},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199340},
  doi          = {10.1109/SECPRI.2003.1199340},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhengCMZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2003,
  title        = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8543/proceeding},
  isbn         = {0-7695-1940-7},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics