ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
Latest Publications
TOTAL DOCUMENTS
30
(FIVE YEARS 0)
H-INDEX
15
(FIVE YEARS 0)
Published By IEEE Comput. Soc. Press
0818678283
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Is The Trusted Computing Base Concept Fundamentally Flawed?
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601304
◽
2005
◽
Cited By ~ 2
Author(s):
J. McLean
Keyword(s):
Trusted Computing
◽
Base Concept
◽
Trusted Computing Base
Download Full-text
An MBone proxy for an application gateway firewall
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601318
◽
2002
◽
Cited By ~ 1
Author(s):
K. Djahandari
◽
D.E. Sterne
Download Full-text
Number theoretic attacks on secure password schemes
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601340
◽
2002
◽
Cited By ~ 45
Author(s):
S. Patel
Download Full-text
Filtering postures: local enforcement for global policies
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601327
◽
2002
◽
Cited By ~ 60
Author(s):
J.D. Guttman
Download Full-text
A general theory of security properties
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601322
◽
2002
◽
Cited By ~ 61
Author(s):
A. Zakinthinos
◽
E.S. Lee
Keyword(s):
General Theory
◽
Security Properties
Download Full-text
A secure and reliable bootstrap architecture
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601317
◽
2002
◽
Cited By ~ 160
Author(s):
W.A. Arbaugh
◽
D.J. Farber
◽
J.M. Smith
Download Full-text
Catalytic inference analysis: detecting inference threats due to knowledge discovery
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601333
◽
2002
◽
Cited By ~ 9
Author(s):
J. Hale
◽
S. Shenoi
Keyword(s):
Knowledge Discovery
Download Full-text
Research on proof-carrying code for untrusted-code security
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601335
◽
2002
◽
Cited By ~ 6
Author(s):
G. Necula
◽
P. Lee
Keyword(s):
Code Security
◽
Untrusted Code
Download Full-text
Execution monitoring of security-critical programs in distributed systems: a specification-based approach
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601332
◽
2002
◽
Cited By ~ 108
Author(s):
C. Ko
◽
M. Ruschitzka
◽
K. Levitt
Keyword(s):
Distributed Systems
◽
Execution Monitoring
Download Full-text
Anonymous connections and onion routing
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601314
◽
2002
◽
Cited By ~ 197
Author(s):
P.F. Syverson
◽
D.M. Goldschlag
◽
M.G. Reed
Keyword(s):
Onion Routing
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close