Default Cover Image

2003 Symposium on Security and Privacy, 2003.

May 11 2003 to May 14 2003

Berkeley, CA

ISSN: 1540-7993

ISBN: 0-7695-1940-7

Table of Contents

Message from the Program ChairsFreely available from IEEE.pp. vii
Program CommitteeFreely available from IEEE.pp. viii
Session: Anonymity
Mixminion: Design of a Type III Anonymous Remailer ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 2
Session: Anonymity
Probabilistic Treatment of MIXes to Hamper Traffic AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 16
Author indexFreely available from IEEE.pp. 275-275
Session: Anonymity
Defending Anonymous Communications Against Passive Logging AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 28
Session: IDS
Active Mapping: Resisting NIDS Evasion without Altering TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 44
Session: IDS
Anomaly Detection Using Call Stack InformationFull-text access may be available. Sign in or learn about subscription options.pp. 62
Session: OS
Defending Against Denial-of-Service Attacks with Puzzle AuctionsFull-text access may be available. Sign in or learn about subscription options.pp. 78
Session: OS
Pi: A Path Identification Mechanism to Defend against DDoS AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 93
Session: Formal Methods
A Unified Scheme for Resource Protection in Automated Trust NegotiationFull-text access may be available. Sign in or learn about subscription options.pp. 110
Session: Formal Methods
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 123
Session: Formal Methods
Intransitive Non-Interference for Cryptographic PurposesFull-text access may be available. Sign in or learn about subscription options.pp. 140
Session: Hardware
Using Memory Errors to Attack a Virtual MachineFull-text access may be available. Sign in or learn about subscription options.pp. 154
Session: Hardware
Specifying and Verifying Hardware for Tamper-Resistant SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 166
Session: Hardware & Crypto
Secret Handshakes from Pairing-Based Key AgreementsFull-text access may be available. Sign in or learn about subscription options.pp. 180
Session: Hardware & Crypto
Random Key Predistribution Schemes for Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 197
Session: Distributed Systems
Hardening Functions for Large Scale Distributed ComputationsFull-text access may be available. Sign in or learn about subscription options.pp. 216
Session: Distributed Systems
A Practical Revocation Scheme for Broadcast Encryption Using Smart CardsFull-text access may be available. Sign in or learn about subscription options.pp. 225
Session: Distributed Systems
Using Replication and Partitioning to Build Secure Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 236
Session: Distributed Systems
Vulnerabilities in Synchronous IPC DesignsFull-text access may be available. Sign in or learn about subscription options.pp. 251
Session: Distributed Systems
Garbage Collector Memory Accounting in Language-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 263
Session: Distributed Systems
Author's IndexFreely available from IEEE.pp. 275
Showing 23 out of 23