Default Cover Image

2012 IEEE Symposium on Security and Privacy Workshops

May 24 2012 to May 25 2012

San Francisco, CA USA

ISBN: 978-0-7695-4740-4

Table of Contents

Papers
Policy Aware Social MinerFreely available from IEEE.pp. 53-59
Papers
WSCS 2012 Program CommitteeFreely available from IEEE.pp. xv
Papers
Side-Channel Analysis of Grøstl and SkeinFreely available from IEEE.pp. 16-26
Papers
[Title page iii]Freely available from IEEE.pp. iii
Papers
Privacy in Online Review SitesFreely available from IEEE.pp. 45-52
Papers
Towards a Semantics of PhishFreely available from IEEE.pp. 91-96
Papers
Forensic Methods for Detecting Insider Turning BehaviorsFreely available from IEEE.pp. 150-158
Papers
TrustED 2012 Program CommitteeFreely available from IEEE.pp. xii
Papers
Preface - WSCS 2012Freely available from IEEE.pp. xiv
Papers
WSCS 2012 External ReviewersFreely available from IEEE.pp. xvi
Papers
A Method for Preventing "Skipping" AttacksFreely available from IEEE.pp. 12-15
Papers
SPW 2012 Conference OrganizersFreely available from IEEE.pp. x
Papers
The BlueJay Ultra-Lightweight Hybrid CryptosystemFreely available from IEEE.pp. 27-32
Papers
Implementing Mental ModelsFreely available from IEEE.pp. 86-90
Papers
Preface - TrustED 2012Freely available from IEEE.pp. xi
Papers
TrustED 2012 External ReviewersFreely available from IEEE.pp. xiii
Papers
Preface - WRIT 2012Freely available from IEEE.pp. xvii
Papers
Author indexFreely available from IEEE.pp. 164
Papers
[Title page i]Freely available from IEEE.pp. i
Papers
Message from the General Chair - SPW 2012Freely available from IEEE.pp. viii-ix
Showing 38 out of 38