Accepted Papers
- CPOL: High-Performance Policy Evaluation by Kevin Borders, Xin Zhao, and Atul Prakash
-
Understanding and developing role-based administrative models by Jason Crampton
-
Modeling Insider Attacks on Group Key-Exchange Protocols by Jonathan Katz and Ji Sun Shin
-
An architecture for robust pseudo-random generation and Applications to /dev/random by Boaz Barak and Shai Halevi
-
Securing Publish-Subscribe Overlay Services with EventGuard by Mudhakar Srivatsa and Ling Liu
-
Applications of Secure Electronic Voting to Automated
Privacy-Preserving Troubleshooting by Qiang Huang, David Jao, and Helen Wang
-
New Approaches for Deniable Authentication by Mario Di Raimondo and Rosario Gennaro
-
On the Cost-Ineffectiveness of Redundancy in Commercial P2P Computing by Matthew Yurkewych, Brian N. Levine, and Arnold L. Rosenberg
-
Proxy Re-Signatures: New Definitions, Algorithms, and Applications by Giuseppe Ateniese and Susan Hohenberger
-
A Framework for Concrete Reputation-Systems with Applications to
History-Based Access Control by Karl Krukow, Mogens Nielsen and Vladimiro Sassone
-
Automated Trust Negotiation Using Cryptographic Credentials by Jiangtao Li, Ninghui Li, and William H. Winsborough
-
Anomaly Detection as a Reputation System for Online Auctioning by Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon
Giffin, Nicholas Kidd, Louis Kruger, and Hao Wang
-
Dynamic and Efficient Key Management for Access Hierarchies by Mikhail Atallah, Keith Frikken, and Marina Blanton
-
Secure Collaboration in Mediator-Free Environments by Mohamed Shehab, Elisa Bertino, and Arif Ghafoor
-
A Modular Correctness Proof of IEEE 802.11i and TLS by Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, and John C.
Mitchell
-
Exploiting Open Functionality in SMS-Capable Cellular Networks by Patrick Traynor, William Enck, Tom La Porta, and Patrick McDaniel
-
Automatic Placement of Authorization Hooks in the Linux Security
Modules Framework by Vinod Ganapathy, Trent Jaeger and Somesh Jha
-
Control-Flow Integrity: Principles, Implementations, and
Applications by Martin Abadi, Mihai Budiu, Ulfar Erlingsson, and Jay Ligatti
-
On authenticated computing and RSA-based authentication by Jean-Pierre Seifert
-
Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet
by Xinyuan Wang, Shiping Chen, and Sushil Jajodia
-
Password Authenticated Key Exchange Using Hidden Smooth Subgroups by Craig Gentry, Philip MacKenzie, and Zulfikar Ramzan
-
PeerAccess: A Logic for Distributed Authorization by Marianne Winslett, Charles Zhang, and Piero Andrea Bonatti
-
Preventing Format-String Attacks via Automatic and Efficient
Dynamic Checking by Michael F. Ringenburg and Dan Grossman
-
Misbehaving TCP Receivers Can Cause Internet-Wide Congestion
Collapse by Rob Sherwood, Bobby Bhattacharjee, and Ryan Braud
-
Countering DoS Attacks With Stateless Multipath Overlays by Angelos Stavrou and Angelos D. Keromytis
-
Untraceable RFID Tags via Insubvertible Encryption by Giuseppe Ateniese, Jan Camenisch, and Breno de Medeiros
-
Keyboard Acoustic Emanations Revisited by Li Zhuang, Feng Zhou and J. D. Tygar
-
Improving Brumley and Boneh Timing Attack on Unprotected SSL
Implementations by Onur AciiÇmez, Werner Schindler, and Çetin Kaya KoÇ
-
Fast and Automated Generation of Attack Signatures: A
Basis for Building Self-Protecting Serversby Zhenkai Liang and
R. Sekar
-
Prevent Attribute Information Leakage in Automated Trust Negotiation by Keith Irwin and Ting Yu
-
Deciding security of protocols against off-line guessing attacks
by Mathieu Baudet
-
Direct Chosen Ciphertext Security from Identity-Based Techniques
by Xavier Boyen, Qixiang Mei and Brent Waters
-
Fast Dictionary Attacks on Human-Memorable Passwords Using
Time-Space Tradeoff by Arvind Narayanan and Vitaly Shmatikov
-
Obfuscated Databases and Group Privacy
by Arvind Narayanan and Vitaly Shmatikov
-
Aggregated Path Authentication for Efficient BGP Security
by Meiyuan Zhao, Sean Smith, and David Nicol
-
Secrecy Types for a Simulatable Cryptographic Library
by Peeter Laud
-
Automatic Diagnosis and Response to Memory Corruption
Vulnerabilities
by Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, and Chris Bookholt
-
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and
Metamorphic Worm Exploits by
Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, and Frederic T. Chong

