ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
Latest Publications
TOTAL DOCUMENTS
27
(FIVE YEARS 0)
H-INDEX
14
(FIVE YEARS 0)
Published By IEEE
0769521363
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Formalizing sensitivity in static analysis for intrusion detection
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
◽
10.1109/secpri.2004.1301324
◽
2004
◽
Cited By ~ 18
Author(s):
Henry Hanping Feng
◽
J.T. Giffin
◽
Yong Huang
◽
S. Jha
◽
Wenke Lee
◽
...
Keyword(s):
Intrusion Detection
◽
Static Analysis
Download Full-text
SWATT: software-based attestation for embedded devices
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
◽
10.1109/secpri.2004.1301329
◽
2004
◽
Cited By ~ 217
Author(s):
A. Seshadri
◽
A. Perrig
◽
L. van Doorn
◽
P. Khosla
Keyword(s):
Embedded Devices
Download Full-text
Large-scale IP traceback in high-speed internet: practical techniques and theoretical foundation
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
◽
10.1109/secpri.2004.1301319
◽
2004
◽
Cited By ~ 5
Author(s):
Jun Li
◽
Minho Sung
◽
Jun Xu
◽
Li Li
Keyword(s):
High Speed
◽
Large Scale
◽
Theoretical Foundation
◽
Ip Traceback
Download Full-text
An empirical analysis of target-resident dos filters
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
◽
10.1109/secpri.2004.1301318
◽
2004
◽
Cited By ~ 12
Author(s):
M. Collins
◽
M.K. Reiter
Keyword(s):
Empirical Analysis
Download Full-text
Run-time principals in information-flow type systems
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
◽
10.1109/secpri.2004.1301323
◽
2004
◽
Cited By ~ 24
Author(s):
S. Tse
◽
S. Zdancewic
Keyword(s):
Information Flow
◽
Type Systems
◽
Flow Type
◽
Run Time
Download Full-text
Safety in automated trust negotiation
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
◽
10.1109/secpri.2004.1301321
◽
2004
◽
Cited By ~ 49
Author(s):
W.H. Winsborough
◽
Ninghui Li
Keyword(s):
Trust Negotiation
◽
Automated Trust Negotiation
Download Full-text
On-the-fly verification of rateless erasure codes for efficient content distribution
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
◽
10.1109/secpri.2004.1301326
◽
2004
◽
Cited By ~ 152
Author(s):
M.N. Krohn
◽
M.J. Freedman
◽
D. Mazieres
Keyword(s):
Content Distribution
◽
Erasure Codes
Download Full-text
Fast portscan detection using sequential hypothesis testing
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
◽
10.1109/secpri.2004.1301325
◽
2004
◽
Cited By ~ 241
Author(s):
Jaeyeon Jung
◽
V. Paxson
◽
A.W. Berger
◽
H. Balakrishnan
Keyword(s):
Hypothesis Testing
◽
Sequential Hypothesis
◽
Sequential Hypothesis Testing
Download Full-text
A layered design of discretionary access controls with decidable safety properties
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
◽
10.1109/secpri.2004.1301315
◽
2004
◽
Cited By ~ 11
Author(s):
J.A. Solworth
◽
R.H. Sloan
Keyword(s):
Safety Properties
◽
Access Controls
◽
Layered Design
Download Full-text
Keyboard acoustic emanations
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
◽
10.1109/secpri.2004.1301311
◽
2004
◽
Cited By ~ 89
Author(s):
D. Asonov
◽
R. Agrawal
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close