The Community for Technology Leaders
RSS Icon
Subscribe
2012 IEEE Symposium on Security and Privacy (2005)
Oakland, California
May 8, 2005 to May 11, 2005
ISBN: 0-7695-2339-0
TABLE OF CONTENTS
Session: Intrusion Detection
Shai Rubin , University of Wisconsin, Madison
Somesh Jha , University of Wisconsin, Madison
Barton P. Miller , University of Wisconsin, Madison
pp. 3-17
Rajeev Gopalakrishna , Purdue University
Eugene H. Spafford , Purdue University
Jan Vitek , Purdue University
pp. 18-31
Mihai Christodorescu , University of Wisconsin, Madison
Somesh Jha , University of Wisconsin, Madison
Sanjit A. Seshia , Carnegie Mellon University
Dawn Song , Carnegie Mellon University
Randal E. Bryant , Carnegie Mellon University
pp. 32-46
Session: Sensor Networks
Bryan Parno , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Virgil Gligor , University of Maryland
pp. 49-63
Jonathan M. McCune , Carnegie Mellon University
Elaine Shi , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Michael K. Reiter , Carnegie Mellon University
pp. 64-78
Session: Access Control and Authentication
Lujo Bauer , CyLab, Carnegie Mellon University
Scott Garriss , Carnegie Mellon University
Michael K. Reiter , CyLab, Carnegie Mellon University
pp. 81-95
Ninghui Li , Purdue University, West Lafayette, IN
Mahesh V. Tripunitara , Purdue University, West Lafayette, IN
pp. 96-109
Jonathan M. McCune , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Michael K. Reiter , Carnegie Mellon University
pp. 110-124
Session: Integrity
Glenn Wurster , Carleton University, Canada
P.C. van Oorschot , Carleton University, Canada
Anil Somayaji , Carleton University, Canada
pp. 127-138
Dwaine Clarke , Massachusetts Institute of Technology, Cambridge, MA
G. Edward Suh , Massachusetts Institute of Technology, Cambridge, MA
Blaise Gassend , Massachusetts Institute of Technology, Cambridge, MA
Ajay Sudan , Massachusetts Institute of Technology, Cambridge, MA
Marten van Dijk , Massachusetts Institute of Technology, Cambridge, MA
Srinivas Devadas , Massachusetts Institute of Technology, Cambridge, MA
pp. 139-153
Elaine Shi , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Leendert Van Doorn , IBM T.J. Watson Research Center
pp. 154-168
Session: Cryptography and Protocols
Michael Backes , IBM Zurich Research Laboratory, R?schlikon, Switzerland
Birgit Pfitzmann , IBM Zurich Research Laboratory, R?schlikon, Switzerland
pp. 171-182
Steven J. Murdoch , University of Cambridge, United Kingdom
George Danezis , University of Cambridge, United Kingdom
pp. 183-195
Session: Worms and Network Forensics
Tadayoshi Kohno , UC San Diego
Andre Broido , UC San Diego
KC Claffy , UC San Diego
pp. 211-225
James Newsome , Carnegie Mellon University
Brad Karp , Carnegie Mellon University
Dawn Song , Carnegie Mellon University
pp. 226-241
Yinglian Xie , Carnegie Mellon University
Vyas Sekar , Carnegie Mellon University
David A. Maltz , Carnegie Mellon University
Michael K. Reiter , Carnegie Mellon University
Hui Zhang , Carnegie Mellon University
pp. 242-256
Author Index (PDF)
pp. 257
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool