Search Results
2. Using Execution Transactions To Recover From Buffer Overflow Attacks
3. The Pseudorandomness of Elastic Block Ciphers
4. STAND: Sanitization Tool for ANomaly Detection
5. Speculative Execution as an Operating System Service
6. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
7. Secret Key Cryptography Using Graphics Cards
8. Requirements for Scalable Access Control and Security Management Architectures
9. Remotely Keyed CryptoGraphics - Secure Remote Display Access Using (Mostly) Untrusted Hardware - Extended Version
10. Quantifying Application Behavior Space for Detection and Self-Healing
11. Path-based Access Control for Enterprise Networks
12. PalProtect: A Collaborative Security Approach to Comment Spam
13. PachyRand: SQL Randomization for the PostgreSQL JDBC Driver
14. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection
15. On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses
16. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow
17. LinkWidth: A Method to Measure Link Capacity and Available Bandwidth using Single-End Probes
18. LinkWidth: A Method to measure Link Capacity and Available Bandwidth Using Single-End Probes
19. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
20. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
- « Previous
- Next »
- 1
- 2
- 3