|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 80 occurrences of 68 keywords
|
|
|
Results
Found 623 publication records. Showing 623 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Davide Balzarotti, Marco Cova, Giovanni Vigna |
ClearShot: Eavesdropping on Keyboard Input from Video. |
SP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Mudhakar Srivatsa, Ling Liu 0001, Arun Iyengar |
Preserving Caller Anonymity in Voice-over-IP Networks. |
SP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Periklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, Miguel Castro 0001 |
Preventing Memory Error Exploits with WIT. |
SP |
2008 |
DBLP DOI BibTeX RDF |
static analysis, instrumentation, attack detection, memory errors |
1 | Ronald William Smith, George Scott Knight |
Predictable Design of Network-Based Covert Communication Systems. |
SP |
2008 |
DBLP DOI BibTeX RDF |
forward error correcting codes, insertion errors, probability of detection, reliability, Covert channels |
1 | Michael Backes 0001, Matteo Maffei, Dominique Unruh |
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. |
SP |
2008 |
DBLP DOI BibTeX RDF |
zero-knowledge, Language-based security, automated verification, applied pi-calculus |
1 | Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis |
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. |
SP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg |
Expressive Declassification Policies and Modular Static Enforcement. |
SP |
2008 |
DBLP DOI BibTeX RDF |
verification, information flow, declassification, downgrading |
1 | Nikhil Swamy, Brian J. Corcoran, Michael Hicks 0001 |
Fable: A Language for Enforcing User-defined Security Policies. |
SP |
2008 |
DBLP DOI BibTeX RDF |
verified enforcement, access control, information flow, provenance, Language-based security |
1 | Somesh Jha, Louis Kruger, Vitaly Shmatikov |
Towards Practical Privacy for Genomic Computation. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Edit Distance, Genome, Secure Multi-Party Computation, Smith-Waterman |
1 | |
2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA |
SP |
2008 |
DBLP BibTeX RDF |
|
1 | Bryan D. Payne, Martim Carbone, Monirul Islam Sharif, Wenke Lee |
Lares: An Architecture for Secure Active Monitoring Using Virtualization. |
SP |
2008 |
DBLP DOI BibTeX RDF |
virtualization, active monitoring, introspection |
1 | Michael R. Clarkson, Stephen Chong, Andrew C. Myers |
Civitas: Toward a Secure Voting System. |
SP |
2008 |
DBLP DOI BibTeX RDF |
verifiable elections, voter registration, secure bulletin boards, cryptographic protocols, Electronic voting, coercion resistance |
1 | Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao |
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. |
SP |
2008 |
DBLP DOI BibTeX RDF |
sybil identity, SybilLimit, social networks, Sybil attack |
1 | Saar Drimer, Steven J. Murdoch, Ross J. Anderson |
Thinking Inside the Box: System-Level Failures of Tamper Proofing. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Chip and PIN, PIN entry devices, certification, incentives, smartcard, banking, tamper resistance, common criteria, EMV |
1 | Randy Smith, Cristian Estan, Somesh Jha |
XFA: Faster Signature Matching with Extended Automata. |
SP |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, regular expressions, finite automata, signature matching |
1 | Michael Backes 0001, Markus Dürmuth, Dominique Unruh |
Compromising Reflections-or-How to Read LCD Monitors around the Corner. |
SP |
2008 |
DBLP DOI BibTeX RDF |
optical emanations, Security |
1 | Bruno Blanchet, Avik Chaudhuri |
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. |
SP |
2008 |
DBLP DOI BibTeX RDF |
lazy revocation, key rotation, cryptographic access control, automatic verification, secure storage |
1 | David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng 0002 |
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. |
SP |
2008 |
DBLP DOI BibTeX RDF |
exploit generation, combined execution, symbolic execution, test case generation, patch |
1 | Arvind Narayanan, Vitaly Shmatikov |
Robust De-anonymization of Large Sparse Datasets. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Anonymity, Attack |
1 | Parvathinathan Venkitasubramaniam, Lang Tong |
Anonymous Networking with Minimum Latency in Multihop Networks. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Network Security, Anonymity, Traffic Analysis, Rate-Distortion |
1 | Suhabe Bugrara, Alex Aiken |
Verifying the Safety of User Pointer Dereferences. |
SP |
2008 |
DBLP DOI BibTeX RDF |
user pointers, verification, static analysis, operating system security |
1 | Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna |
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. |
SP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Mythili Vutukuru, Hari Balakrishnan, Vern Paxson |
Efficient and Robust TCP Stream Normalization. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection Systems, Normalization, Evasion Attacks |
Displaying result #601 - #623 of 623 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7] |
|